You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

AlphaFS.dll.CodeAnalysisLog.xml 16 MiB

7 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789979097919792979397949795979697979798979998009801980298039804980598069807980898099810981198129813981498159816981798189819982098219822982398249825982698279828982998309831983298339834983598369837983898399840984198429843984498459846984798489849985098519852985398549855985698579858985998609861986298639864986598669867986898699870987198729873987498759876987798789879988098819882988398849885988698879888988998909891989298939894989598969897989898999900990199029903990499059906990799089909991099119912991399149915991699179918991999209921992299239924992599269927992899299930993199329933993499359936993799389939994099419942994399449945994699479948994999509951995299539954995599569957995899599960996199629963996499659966996799689969997099719972997399749975997699779978997999809981998299839984998599869987998899899990999199929993999499959996999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210053100541005510056100571005810059100601006110062100631006410065100661006710068100691007010071100721007310074100751007610077100781007910080100811008210083100841008510086100871008810089100901009110092100931009410095100961009710098100991010010101101021010310104101051010610107101081010910110101111011210113101141011510116101171011810119101201012110122101231012410125101261012710128101291013010131101321013310134101351013610137101381013910140101411014210143101441014510146101471014810149101501015110152101531015410155101561015710158101591016010161101621016310164101651016610167101681016910170101711017210173101741017510176101771017810179101801018110182101831018410185101861018710188101891019010191101921019310194101951019610197101981019910200102011020210203102041020510206102071020810209102101021110212102131021410215102161021710218102191022010221102221022310224102251022610227102281022910230102311023210233102341023510236102371023810239102401024110242102431024410245102461024710248102491025010251102521025310254102551025610257102581025910260102611026210263102641026510266102671026810269102701027110272102731027410275102761027710278102791028010281102821028310284102851028610287102881028910290102911029210293102941029510296102971029810299103001030110302103031030410305103061030710308103091031010311103121031310314103151031610317103181031910320103211032210323103241032510326103271032810329103301033110332103331033410335103361033710338103391034010341103421034310344103451034610347103481034910350103511035210353103541035510356103571035810359103601036110362103631036410365103661036710368103691037010371103721037310374103751037610377103781037910380103811038210383103841038510386103871038810389103901039110392103931039410395103961039710398103991040010401104021040310404104051040610407104081040910410104111041210413104141041510416104171041810419104201042110422104231042410425104261042710428104291043010431104321043310434104351043610437104381043910440104411044210443104441044510446104471044810449104501045110452104531045410455104561045710458104591046010461104621046310464104651046610467104681046910470104711047210473104741047510476104771047810479104801048110482104831048410485104861048710488104891049010491104921049310494104951049610497104981049910500105011050210503105041050510506105071050810509105101051110512105131051410515105161051710518105191052010521105221052310524105251052610527105281052910530105311053210533105341053510536105371053810539105401054110542105431054410545105461054710548105491055010551105521055310554105551055610557105581055910560105611056210563105641056510566105671056810569105701057110572105731057410575105761057710578105791058010581105821058310584105851058610587105881058910590105911059210593105941059510596105971059810599106001060110602106031060410605106061060710608106091061010611106121061310614106151061610617106181061910620106211062210623106241062510626106271062810629106301063110632106331063410635106361063710638106391064010641106421064310644106451064610647106481064910650106511065210653106541065510656106571065810659106601066110662106631066410665106661066710668106691067010671106721067310674106751067610677106781067910680106811068210683106841068510686106871068810689106901069110692106931069410695106961069710698106991070010701107021070310704107051070610707107081070910710107111071210713107141071510716107171071810719107201072110722107231072410725107261072710728107291073010731107321073310734107351073610737107381073910740107411074210743107441074510746107471074810749107501075110752107531075410755107561075710758107591076010761107621076310764107651076610767107681076910770107711077210773107741077510776107771077810779107801078110782107831078410785107861078710788107891079010791107921079310794107951079610797107981079910800108011080210803108041080510806108071080810809108101081110812108131081410815108161081710818108191082010821108221082310824108251082610827108281082910830108311083210833108341083510836108371083810839108401084110842108431084410845108461084710848108491085010851108521085310854108551085610857108581085910860108611086210863108641086510866108671086810869108701087110872108731087410875108761087710878108791088010881108821088310884108851088610887108881088910890108911089210893108941089510896108971089810899109001090110902109031090410905109061090710908109091091010911109121091310914109151091610917109181091910920109211092210923109241092510926109271092810929109301093110932109331093410935109361093710938109391094010941109421094310944109451094610947109481094910950109511095210953109541095510956109571095810959109601096110962109631096410965109661096710968109691097010971109721097310974109751097610977109781097910980109811098210983109841098510986109871098810989109901099110992109931099410995109961099710998109991100011001110021100311004110051100611007110081100911010110111101211013110141101511016110171101811019110201102111022110231102411025110261102711028110291103011031110321103311034110351103611037110381103911040110411104211043110441104511046110471104811049110501105111052110531105411055110561105711058110591106011061110621106311064110651106611067110681106911070110711107211073110741107511076110771107811079110801108111082110831108411085110861108711088110891109011091110921109311094110951109611097110981109911100111011110211103111041110511106111071110811109111101111111112111131111411115111161111711118111191112011121111221112311124111251112611127111281112911130111311113211133111341113511136111371113811139111401114111142111431114411145111461114711148111491115011151111521115311154111551115611157111581115911160111611116211163111641116511166111671116811169111701117111172111731117411175111761117711178111791118011181111821118311184111851118611187111881118911190111911119211193111941119511196111971119811199112001120111202112031120411205112061120711208112091121011211112121121311214112151121611217112181121911220112211122211223112241122511226112271122811229112301123111232112331123411235112361123711238112391124011241112421124311244112451124611247112481124911250112511125211253112541125511256112571125811259112601126111262112631126411265112661126711268112691127011271112721127311274112751127611277112781127911280112811128211283112841128511286112871128811289112901129111292112931129411295112961129711298112991130011301113021130311304113051130611307113081130911310113111131211313113141131511316113171131811319113201132111322113231132411325113261132711328113291133011331113321133311334113351133611337113381133911340113411134211343113441134511346113471134811349113501135111352113531135411355113561135711358113591136011361113621136311364113651136611367113681136911370113711137211373113741137511376113771137811379113801138111382113831138411385113861138711388113891139011391113921139311394113951139611397113981139911400114011140211403114041140511406114071140811409114101141111412114131141411415114161141711418114191142011421114221142311424114251142611427114281142911430114311143211433114341143511436114371143811439114401144111442114431144411445114461144711448114491145011451114521145311454114551145611457114581145911460114611146211463114641146511466114671146811469114701147111472114731147411475114761147711478114791148011481114821148311484114851148611487114881148911490114911149211493114941149511496114971149811499115001150111502115031150411505115061150711508115091151011511115121151311514115151151611517115181151911520115211152211523115241152511526115271152811529115301153111532115331153411535115361153711538115391154011541115421154311544115451154611547115481154911550115511155211553115541155511556115571155811559115601156111562115631156411565115661156711568115691157011571115721157311574115751157611577115781157911580115811158211583115841158511586115871158811589115901159111592115931159411595115961159711598115991160011601116021160311604116051160611607116081160911610116111161211613116141161511616116171161811619116201162111622116231162411625116261162711628116291163011631116321163311634116351163611637116381163911640116411164211643116441164511646116471164811649116501165111652116531165411655116561165711658116591166011661116621166311664116651166611667116681166911670116711167211673116741167511676116771167811679116801168111682116831168411685116861168711688116891169011691116921169311694116951169611697116981169911700117011170211703117041170511706117071170811709117101171111712117131171411715117161171711718117191172011721117221172311724117251172611727117281172911730117311173211733117341173511736117371173811739117401174111742117431174411745117461174711748117491175011751117521175311754117551175611757117581175911760117611176211763117641176511766117671176811769117701177111772117731177411775117761177711778117791178011781117821178311784117851178611787117881178911790117911179211793117941179511796117971179811799118001180111802118031180411805118061180711808118091181011811118121181311814118151181611817118181181911820118211182211823118241182511826118271182811829118301183111832118331183411835118361183711838118391184011841118421184311844118451184611847118481184911850118511185211853118541185511856118571185811859118601186111862118631186411865118661186711868118691187011871118721187311874118751187611877118781187911880118811188211883118841188511886118871188811889118901189111892118931189411895118961189711898118991190011901119021190311904119051190611907119081190911910119111191211913119141191511916119171191811919119201192111922119231192411925119261192711928119291193011931119321193311934119351193611937119381193911940119411194211943119441194511946119471194811949119501195111952119531195411955119561195711958119591196011961119621196311964119651196611967119681196911970119711197211973119741197511976119771197811979119801198111982119831198411985119861198711988119891199011991119921199311994119951199611997119981199912000120011200212003120041200512006120071200812009120101201112012120131201412015120161201712018120191202012021120221202312024120251202612027120281202912030120311203212033120341203512036120371203812039120401204112042120431204412045120461204712048120491205012051120521205312054120551205612057120581205912060120611206212063120641206512066120671206812069120701207112072120731207412075120761207712078120791208012081120821208312084120851208612087120881208912090120911209212093120941209512096120971209812099121001210112102121031210412105121061210712108121091211012111121121211312114121151211612117121181211912120121211212212123121241212512126121271212812129121301213112132121331213412135121361213712138121391214012141121421214312144121451214612147121481214912150121511215212153121541215512156121571215812159121601216112162121631216412165121661216712168121691217012171121721217312174121751217612177121781217912180121811218212183121841218512186121871218812189121901219112192121931219412195121961219712198121991220012201122021220312204122051220612207122081220912210122111221212213122141221512216122171221812219122201222112222122231222412225122261222712228122291223012231122321223312234122351223612237122381223912240122411224212243122441224512246122471224812249122501225112252122531225412255122561225712258122591226012261122621226312264122651226612267122681226912270122711227212273122741227512276122771227812279122801228112282122831228412285122861228712288122891229012291122921229312294122951229612297122981229912300123011230212303123041230512306123071230812309123101231112312123131231412315123161231712318123191232012321123221232312324123251232612327123281232912330123311233212333123341233512336123371233812339123401234112342123431234412345123461234712348123491235012351123521235312354123551235612357123581235912360123611236212363123641236512366123671236812369123701237112372123731237412375123761237712378123791238012381123821238312384123851238612387123881238912390123911239212393123941239512396123971239812399124001240112402124031240412405124061240712408124091241012411124121241312414124151241612417124181241912420124211242212423124241242512426124271242812429124301243112432124331243412435124361243712438124391244012441124421244312444124451244612447124481244912450124511245212453124541245512456124571245812459124601246112462124631246412465124661246712468124691247012471124721247312474124751247612477124781247912480124811248212483124841248512486124871248812489124901249112492124931249412495124961249712498124991250012501125021250312504125051250612507125081250912510125111251212513125141251512516125171251812519125201252112522125231252412525125261252712528125291253012531125321253312534125351253612537125381253912540125411254212543125441254512546125471254812549125501255112552125531255412555125561255712558125591256012561125621256312564125651256612567125681256912570125711257212573125741257512576125771257812579125801258112582125831258412585125861258712588125891259012591125921259312594125951259612597125981259912600126011260212603126041260512606126071260812609126101261112612126131261412615126161261712618126191262012621126221262312624126251262612627126281262912630126311263212633126341263512636126371263812639126401264112642126431264412645126461264712648126491265012651126521265312654126551265612657126581265912660126611266212663126641266512666126671266812669126701267112672126731267412675126761267712678126791268012681126821268312684126851268612687126881268912690126911269212693126941269512696126971269812699127001270112702127031270412705127061270712708127091271012711127121271312714127151271612717127181271912720127211272212723127241272512726127271272812729127301273112732127331273412735127361273712738127391274012741127421274312744127451274612747127481274912750127511275212753127541275512756127571275812759127601276112762127631276412765127661276712768127691277012771127721277312774127751277612777127781277912780127811278212783127841278512786127871278812789127901279112792127931279412795127961279712798127991280012801128021280312804128051280612807128081280912810128111281212813128141281512816128171281812819128201282112822128231282412825128261282712828128291283012831128321283312834128351283612837128381283912840128411284212843128441284512846128471284812849128501285112852128531285412855128561285712858128591286012861128621286312864128651286612867128681286912870128711287212873128741287512876128771287812879128801288112882128831288412885128861288712888128891289012891128921289312894128951289612897128981289912900129011290212903129041290512906129071290812909129101291112912129131291412915129161291712918129191292012921129221292312924129251292612927129281292912930129311293212933129341293512936129371293812939129401294112942129431294412945129461294712948129491295012951129521295312954129551295612957129581295912960129611296212963129641296512966129671296812969129701297112972129731297412975129761297712978129791298012981129821298312984129851298612987129881298912990129911299212993129941299512996129971299812999130001300113002130031300413005130061300713008130091301013011130121301313014130151301613017130181301913020130211302213023130241302513026130271302813029130301303113032130331303413035130361303713038130391304013041130421304313044130451304613047130481304913050130511305213053130541305513056130571305813059130601306113062130631306413065130661306713068130691307013071130721307313074130751307613077130781307913080130811308213083130841308513086130871308813089130901309113092130931309413095130961309713098130991310013101131021310313104131051310613107131081310913110131111311213113131141311513116131171311813119131201312113122131231312413125131261312713128131291313013131131321313313134131351313613137131381313913140131411314213143131441314513146131471314813149131501315113152131531315413155131561315713158131591316013161131621316313164131651316613167131681316913170131711317213173131741317513176131771317813179131801318113182131831318413185131861318713188131891319013191131921319313194131951319613197131981319913200132011320213203132041320513206132071320813209132101321113212132131321413215132161321713218132191322013221132221322313224132251322613227132281322913230132311323213233132341323513236132371323813239132401324113242132431324413245132461324713248132491325013251132521325313254132551325613257132581325913260132611326213263132641326513266132671326813269132701327113272132731327413275132761327713278132791328013281132821328313284132851328613287132881328913290132911329213293132941329513296132971329813299133001330113302133031330413305133061330713308133091331013311133121331313314133151331613317133181331913320133211332213323133241332513326133271332813329133301333113332133331333413335133361333713338133391334013341133421334313344133451334613347133481334913350133511335213353133541335513356133571335813359133601336113362133631336413365133661336713368133691337013371133721337313374133751337613377133781337913380133811338213383133841338513386133871338813389133901339113392133931339413395133961339713398133991340013401134021340313404134051340613407134081340913410134111341213413134141341513416134171341813419134201342113422134231342413425134261342713428134291343013431134321343313434134351343613437134381343913440134411344213443134441344513446134471344813449134501345113452134531345413455134561345713458134591346013461134621346313464134651346613467134681346913470134711347213473134741347513476134771347813479134801348113482134831348413485134861348713488134891349013491134921349313494134951349613497134981349913500135011350213503135041350513506135071350813509135101351113512135131351413515135161351713518135191352013521135221352313524135251352613527135281352913530135311353213533135341353513536135371353813539135401354113542135431354413545135461354713548135491355013551135521355313554135551355613557135581355913560135611356213563135641356513566135671356813569135701357113572135731357413575135761357713578135791358013581135821358313584135851358613587135881358913590135911359213593135941359513596135971359813599136001360113602136031360413605136061360713608136091361013611136121361313614136151361613617136181361913620136211362213623136241362513626136271362813629136301363113632136331363413635136361363713638136391364013641136421364313644136451364613647136481364913650136511365213653136541365513656136571365813659136601366113662136631366413665136661366713668136691367013671136721367313674136751367613677136781367913680136811368213683136841368513686136871368813689136901369113692136931369413695136961369713698136991370013701137021370313704137051370613707137081370913710137111371213713137141371513716137171371813719137201372113722137231372413725137261372713728137291373013731137321373313734137351373613737137381373913740137411374213743137441374513746137471374813749137501375113752137531375413755137561375713758137591376013761137621376313764137651376613767137681376913770137711377213773137741377513776137771377813779137801378113782137831378413785137861378713788137891379013791137921379313794137951379613797137981379913800138011380213803138041380513806138071380813809138101381113812138131381413815138161381713818138191382013821138221382313824138251382613827138281382913830138311383213833138341383513836138371383813839138401384113842138431384413845138461384713848138491385013851138521385313854138551385613857138581385913860138611386213863138641386513866138671386813869138701387113872138731387413875138761387713878138791388013881138821388313884138851388613887138881388913890138911389213893138941389513896138971389813899139001390113902139031390413905139061390713908139091391013911139121391313914139151391613917139181391913920139211392213923139241392513926139271392813929139301393113932139331393413935139361393713938139391394013941139421394313944139451394613947139481394913950139511395213953139541395513956139571395813959139601396113962139631396413965139661396713968139691397013971139721397313974139751397613977139781397913980139811398213983139841398513986139871398813989139901399113992139931399413995139961399713998139991400014001140021400314004140051400614007140081400914010140111401214013140141401514016140171401814019140201402114022140231402414025140261402714028140291403014031140321403314034140351403614037140381403914040140411404214043140441404514046140471404814049140501405114052140531405414055140561405714058140591406014061140621406314064140651406614067140681406914070140711407214073140741407514076140771407814079140801408114082140831408414085140861408714088140891409014091140921409314094140951409614097140981409914100141011410214103141041410514106141071410814109141101411114112141131411414115141161411714118141191412014121141221412314124141251412614127141281412914130141311413214133141341413514136141371413814139141401414114142141431414414145141461414714148141491415014151141521415314154141551415614157141581415914160141611416214163141641416514166141671416814169141701417114172141731417414175141761417714178141791418014181141821418314184141851418614187141881418914190141911419214193141941419514196141971419814199142001420114202142031420414205142061420714208142091421014211142121421314214142151421614217142181421914220142211422214223142241422514226142271422814229142301423114232142331423414235142361423714238142391424014241142421424314244142451424614247142481424914250142511425214253142541425514256142571425814259142601426114262142631426414265142661426714268142691427014271142721427314274142751427614277142781427914280142811428214283142841428514286142871428814289142901429114292142931429414295142961429714298142991430014301143021430314304143051430614307143081430914310143111431214313143141431514316143171431814319143201432114322143231432414325143261432714328143291433014331143321433314334143351433614337143381433914340143411434214343143441434514346143471434814349143501435114352143531435414355143561435714358143591436014361143621436314364143651436614367143681436914370143711437214373143741437514376143771437814379143801438114382143831438414385143861438714388143891439014391143921439314394143951439614397143981439914400144011440214403144041440514406144071440814409144101441114412144131441414415144161441714418144191442014421144221442314424144251442614427144281442914430144311443214433144341443514436144371443814439144401444114442144431444414445144461444714448144491445014451144521445314454144551445614457144581445914460144611446214463144641446514466144671446814469144701447114472144731447414475144761447714478144791448014481144821448314484144851448614487144881448914490144911449214493144941449514496144971449814499145001450114502145031450414505145061450714508145091451014511145121451314514145151451614517145181451914520145211452214523145241452514526145271452814529145301453114532145331453414535145361453714538145391454014541145421454314544145451454614547145481454914550145511455214553145541455514556145571455814559145601456114562145631456414565145661456714568145691457014571145721457314574145751457614577145781457914580145811458214583145841458514586145871458814589145901459114592145931459414595145961459714598145991460014601146021460314604146051460614607146081460914610146111461214613146141461514616146171461814619146201462114622146231462414625146261462714628146291463014631146321463314634146351463614637146381463914640146411464214643146441464514646146471464814649146501465114652146531465414655146561465714658146591466014661146621466314664146651466614667146681466914670146711467214673146741467514676146771467814679146801468114682146831468414685146861468714688146891469014691146921469314694146951469614697146981469914700147011470214703147041470514706147071470814709147101471114712147131471414715147161471714718147191472014721147221472314724147251472614727147281472914730147311473214733147341473514736147371473814739147401474114742147431474414745147461474714748147491475014751147521475314754147551475614757147581475914760147611476214763147641476514766147671476814769147701477114772147731477414775147761477714778147791478014781147821478314784147851478614787147881478914790147911479214793147941479514796147971479814799148001480114802148031480414805148061480714808148091481014811148121481314814148151481614817148181481914820148211482214823148241482514826148271482814829148301483114832148331483414835148361483714838148391484014841148421484314844148451484614847148481484914850148511485214853148541485514856148571485814859148601486114862148631486414865148661486714868148691487014871148721487314874148751487614877148781487914880148811488214883148841488514886148871488814889148901489114892148931489414895148961489714898148991490014901149021490314904149051490614907149081490914910149111491214913149141491514916149171491814919149201492114922149231492414925149261492714928149291493014931149321493314934149351493614937149381493914940149411494214943149441494514946149471494814949149501495114952149531495414955149561495714958149591496014961149621496314964149651496614967149681496914970149711497214973149741497514976149771497814979149801498114982149831498414985149861498714988149891499014991149921499314994149951499614997149981499915000150011500215003150041500515006150071500815009150101501115012150131501415015150161501715018150191502015021150221502315024150251502615027150281502915030150311503215033150341503515036150371503815039150401504115042150431504415045150461504715048150491505015051150521505315054150551505615057150581505915060150611506215063150641506515066150671506815069150701507115072150731507415075150761507715078150791508015081150821508315084150851508615087150881508915090150911509215093150941509515096150971509815099151001510115102151031510415105151061510715108151091511015111151121511315114151151511615117151181511915120151211512215123151241512515126151271512815129151301513115132151331513415135151361513715138151391514015141151421514315144151451514615147151481514915150151511515215153151541515515156151571515815159151601516115162151631516415165151661516715168151691517015171151721517315174151751517615177151781517915180151811518215183151841518515186151871518815189151901519115192151931519415195151961519715198151991520015201152021520315204152051520615207152081520915210152111521215213152141521515216152171521815219152201522115222152231522415225152261522715228152291523015231152321523315234152351523615237152381523915240152411524215243152441524515246152471524815249152501525115252152531525415255152561525715258152591526015261152621526315264152651526615267152681526915270152711527215273152741527515276152771527815279152801528115282152831528415285152861528715288152891529015291152921529315294152951529615297152981529915300153011530215303153041530515306153071530815309153101531115312153131531415315153161531715318153191532015321153221532315324153251532615327153281532915330153311533215333153341533515336153371533815339153401534115342153431534415345153461534715348153491535015351153521535315354153551535615357153581535915360153611536215363153641536515366153671536815369153701537115372153731537415375153761537715378153791538015381153821538315384153851538615387153881538915390153911539215393153941539515396153971539815399154001540115402154031540415405154061540715408154091541015411154121541315414154151541615417154181541915420154211542215423154241542515426154271542815429154301543115432154331543415435154361543715438154391544015441154421544315444154451544615447154481544915450154511545215453154541545515456154571545815459154601546115462154631546415465154661546715468154691547015471154721547315474154751547615477154781547915480154811548215483154841548515486154871548815489154901549115492154931549415495154961549715498154991550015501155021550315504155051550615507155081550915510155111551215513155141551515516155171551815519155201552115522155231552415525155261552715528155291553015531155321553315534155351553615537155381553915540155411554215543155441554515546155471554815549155501555115552155531555415555155561555715558155591556015561155621556315564155651556615567155681556915570155711557215573155741557515576155771557815579155801558115582155831558415585155861558715588155891559015591155921559315594155951559615597155981559915600156011560215603156041560515606156071560815609156101561115612156131561415615156161561715618156191562015621156221562315624156251562615627156281562915630156311563215633156341563515636156371563815639156401564115642156431564415645156461564715648156491565015651156521565315654156551565615657156581565915660156611566215663156641566515666156671566815669156701567115672156731567415675156761567715678156791568015681156821568315684156851568615687156881568915690156911569215693156941569515696156971569815699157001570115702157031570415705157061570715708157091571015711157121571315714157151571615717157181571915720157211572215723157241572515726157271572815729157301573115732157331573415735157361573715738157391574015741157421574315744157451574615747157481574915750157511575215753157541575515756157571575815759157601576115762157631576415765157661576715768157691577015771157721577315774157751577615777157781577915780157811578215783157841578515786157871578815789157901579115792157931579415795157961579715798157991580015801158021580315804158051580615807158081580915810158111581215813158141581515816158171581815819158201582115822158231582415825158261582715828158291583015831158321583315834158351583615837158381583915840158411584215843158441584515846158471584815849158501585115852158531585415855158561585715858158591586015861158621586315864158651586615867158681586915870158711587215873158741587515876158771587815879158801588115882158831588415885158861588715888158891589015891158921589315894158951589615897158981589915900159011590215903159041590515906159071590815909159101591115912159131591415915159161591715918159191592015921159221592315924159251592615927159281592915930159311593215933159341593515936159371593815939159401594115942159431594415945159461594715948159491595015951159521595315954159551595615957159581595915960159611596215963159641596515966159671596815969159701597115972159731597415975159761597715978159791598015981159821598315984159851598615987159881598915990159911599215993159941599515996159971599815999160001600116002160031600416005160061600716008160091601016011160121601316014160151601616017160181601916020160211602216023160241602516026160271602816029160301603116032160331603416035160361603716038160391604016041160421604316044160451604616047160481604916050160511605216053160541605516056160571605816059160601606116062160631606416065160661606716068160691607016071160721607316074160751607616077160781607916080160811608216083160841608516086160871608816089160901609116092160931609416095160961609716098160991610016101161021610316104161051610616107161081610916110161111611216113161141611516116161171611816119161201612116122161231612416125161261612716128161291613016131161321613316134161351613616137161381613916140161411614216143161441614516146161471614816149161501615116152161531615416155161561615716158161591616016161161621616316164161651616616167161681616916170161711617216173161741617516176161771617816179161801618116182161831618416185161861618716188161891619016191161921619316194161951619616197161981619916200162011620216203162041620516206162071620816209162101621116212162131621416215162161621716218162191622016221162221622316224162251622616227162281622916230162311623216233162341623516236162371623816239162401624116242162431624416245162461624716248162491625016251162521625316254162551625616257162581625916260162611626216263162641626516266162671626816269162701627116272162731627416275162761627716278162791628016281162821628316284162851628616287162881628916290162911629216293162941629516296162971629816299163001630116302163031630416305163061630716308163091631016311163121631316314163151631616317163181631916320163211632216323163241632516326163271632816329163301633116332163331633416335163361633716338163391634016341163421634316344163451634616347163481634916350163511635216353163541635516356163571635816359163601636116362163631636416365163661636716368163691637016371163721637316374163751637616377163781637916380163811638216383163841638516386163871638816389163901639116392163931639416395163961639716398163991640016401164021640316404164051640616407164081640916410164111641216413164141641516416164171641816419164201642116422164231642416425164261642716428164291643016431164321643316434164351643616437164381643916440164411644216443164441644516446164471644816449164501645116452164531645416455164561645716458164591646016461164621646316464164651646616467164681646916470164711647216473164741647516476164771647816479164801648116482164831648416485164861648716488164891649016491164921649316494164951649616497164981649916500165011650216503165041650516506165071650816509165101651116512165131651416515165161651716518165191652016521165221652316524165251652616527165281652916530165311653216533165341653516536165371653816539165401654116542165431654416545165461654716548165491655016551165521655316554165551655616557165581655916560165611656216563165641656516566165671656816569165701657116572165731657416575165761657716578165791658016581165821658316584165851658616587165881658916590165911659216593165941659516596165971659816599166001660116602166031660416605166061660716608166091661016611166121661316614166151661616617166181661916620166211662216623166241662516626166271662816629166301663116632166331663416635166361663716638166391664016641166421664316644166451664616647166481664916650166511665216653166541665516656166571665816659166601666116662166631666416665166661666716668166691667016671166721667316674166751667616677166781667916680166811668216683166841668516686166871668816689166901669116692166931669416695166961669716698166991670016701167021670316704167051670616707167081670916710167111671216713167141671516716167171671816719167201672116722167231672416725167261672716728167291673016731167321673316734167351673616737167381673916740167411674216743167441674516746167471674816749167501675116752167531675416755167561675716758167591676016761167621676316764167651676616767167681676916770167711677216773167741677516776167771677816779167801678116782167831678416785167861678716788167891679016791167921679316794167951679616797167981679916800168011680216803168041680516806168071680816809168101681116812168131681416815168161681716818168191682016821168221682316824168251682616827168281682916830168311683216833168341683516836168371683816839168401684116842168431684416845168461684716848168491685016851168521685316854168551685616857168581685916860168611686216863168641686516866168671686816869168701687116872168731687416875168761687716878168791688016881168821688316884168851688616887168881688916890168911689216893168941689516896168971689816899169001690116902169031690416905169061690716908169091691016911169121691316914169151691616917169181691916920169211692216923169241692516926169271692816929169301693116932169331693416935169361693716938169391694016941169421694316944169451694616947169481694916950169511695216953169541695516956169571695816959169601696116962169631696416965169661696716968169691697016971169721697316974169751697616977169781697916980169811698216983169841698516986169871698816989169901699116992169931699416995169961699716998169991700017001170021700317004170051700617007170081700917010170111701217013170141701517016170171701817019170201702117022170231702417025170261702717028170291703017031170321703317034170351703617037170381703917040170411704217043170441704517046170471704817049170501705117052170531705417055170561705717058170591706017061170621706317064170651706617067170681706917070170711707217073170741707517076170771707817079170801708117082170831708417085170861708717088170891709017091170921709317094170951709617097170981709917100171011710217103171041710517106171071710817109171101711117112171131711417115171161711717118171191712017121171221712317124171251712617127171281712917130171311713217133171341713517136171371713817139171401714117142171431714417145171461714717148171491715017151171521715317154171551715617157171581715917160171611716217163171641716517166171671716817169171701717117172171731717417175171761717717178171791718017181171821718317184171851718617187171881718917190171911719217193171941719517196171971719817199
  1. <?xml version="1.0" encoding="utf-8"?>
  2. <?xml-stylesheet type="text/xsl" href="c:\program files (x86)\microsoft visual studio 14.0\team tools\static analysis tools\fxcop\Xml\CodeAnalysisReport.xsl"?>
  3. <FxCopReport Version="14.0">
  4. <Targets>
  5. <Target Name="C:\Users\Administrator\Desktop\NTFSSecurity\Bin\Debug\Net35\AlphaFS.dll">
  6. <Modules>
  7. <Module Name="alphafs.dll">
  8. <Messages>
  9. <Message TypeName="AssembliesShouldHaveValidStrongNames" Category="Microsoft.Design" CheckId="CA2210" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  10. <Issue Name="NoStrongName" Certainty="95" Level="CriticalError">Sign 'AlphaFS.dll' with a strong name key.</Issue>
  11. </Message>
  12. </Messages>
  13. <Namespaces>
  14. <Namespace Name="Alphaleonis.Win32">
  15. <Types>
  16. <Type Name="NativeError" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  17. <Members>
  18. <Member Name="#ThrowException()" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  19. <Messages>
  20. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  21. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="36">'NativeError.ThrowException()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException()'&#xD;&#xA; -&gt;'NativeError.ThrowException()'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  22. </Message>
  23. </Messages>
  24. </Member>
  25. <Member Name="#ThrowException(System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="False">
  26. <Messages>
  27. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  28. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  29. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  30. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  31. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  32. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  33. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  34. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  35. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  36. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  37. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  38. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  39. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  40. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  41. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  42. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  43. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  44. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  45. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  46. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  47. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  48. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  49. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  50. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  51. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  52. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  53. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  54. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  55. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  56. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  57. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  58. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  59. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  60. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  61. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  62. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  63. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  64. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  65. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  66. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  67. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  68. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  69. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  70. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  71. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  72. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  73. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  74. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  75. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  76. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  77. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  78. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  79. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  80. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  81. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  82. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  83. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  84. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  85. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  86. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  87. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  88. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  89. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  90. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  91. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  92. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  93. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  94. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  95. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  96. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  97. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  98. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  99. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="150">'NativeError.ThrowException(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  869. </Message>
  870. </Messages>
  871. </Member>
  872. <Member Name="#ThrowException(System.String,System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="False">
  873. <Messages>
  874. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string)'</Issue>
  876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string, DosDeviceAttributes)'</Issue>
  877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string)'</Issue>
  878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string)'</Issue>
  879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, DosDeviceAttributes, bool)'</Issue>
  880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, bool)'</Issue>
  881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="155">'NativeError.ThrowException(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeLabel(string, string)'</Issue>
  882. </Message>
  883. </Messages>
  884. </Member>
  885. <Member Name="#ThrowException(System.UInt32,System.String,System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="False">
  886. <Messages>
  887. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException()'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Flush()'</Issue>
  930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Lock(long, long)'</Issue>
  932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Skip(long)'</Issue>
  934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Unlock(long, long)'</Issue>
  935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  1000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  1001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  1002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  1003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  1004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  1005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  1007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  1008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  1009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  1011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  1012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  1013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  1014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  1015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  1017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  1018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  1019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  1021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  1022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Directory.GetCurrentDirectory()'</Issue>
  1023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  1024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  1025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  1026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  1027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  1029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  1030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  1031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  1034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  1035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  1036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  1037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  1039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  1040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  1041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  1044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  1045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  1046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  1047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  1048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  1049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  1050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  1051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  1052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  1053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  1054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  1055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  1056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  1057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  1058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  1059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  1060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  1061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  1062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  1063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  1064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  1065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  1067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  1068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  1069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  1070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  1071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  1072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  1073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  1074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  1075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  1076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  1077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  1078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  1079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  1080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  1081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  1082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  1083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.Dispose()'&#xD;&#xA; -&gt;'PrivilegeEnabler.Dispose()'</Issue>
  1084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.InternalPrivilegeEnabler(Privilege)'&#xD;&#xA; -&gt;'PrivilegeEnabler.PrivilegeEnabler(Privilege, params Privilege[])'</Issue>
  1085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  1086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  1087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Privilege.LookupDisplayName()'</Issue>
  1088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int)'&#xD;&#xA; -&gt;'Privilege.LookupLuid()'</Issue>
  1089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  1090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  1091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  1092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  1093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  1094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  1095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  1096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  1097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  1098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  1099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  1100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  1101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  1102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  1103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  1104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  1105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  1106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  1107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  1109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  1110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  1111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  1112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  1113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  1114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  1115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  1116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  1117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  1118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  1119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  1120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  1121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  1122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  1123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  1124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  1125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  1126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  1127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  1128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  1129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  1131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  1132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  1133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  1135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  1136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  1137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  1138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  1139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  1140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  1141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  1143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  1144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  1145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  1147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  1149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  1150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  1151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  1152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  1153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  1155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  1156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  1157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  1158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  1159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  1161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  1163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  1164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  1165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  1167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  1168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  1169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  1171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  1172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  1173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  1174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  1175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  1176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  1177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  1178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  1179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  1180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  1181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  1182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  1183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  1184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  1185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  1187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  1188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  1189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  1190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  1191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  1192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  1193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  1194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  1196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  1197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  1198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  1200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  1201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  1202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  1203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  1204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  1205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  1206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  1207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  1209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  1210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  1211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  1212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  1213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  1214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  1216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  1217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  1218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  1219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  1221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  1222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  1223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  1224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  1225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  1226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  1227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  1229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  1230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  1231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  1232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  1233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  1234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  1235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  1236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  1237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  1238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  1239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  1240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  1241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  1242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  1243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  1244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  1245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  1246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  1247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  1248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  1249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  1250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  1251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  1252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  1253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  1254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  1255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  1256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  1257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  1258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  1259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  1260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  1261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  1262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  1263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  1264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  1265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  1266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  1267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  1268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  1269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  1270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  1271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  1272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  1274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  1275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  1276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  1277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  1278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  1279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  1280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  1281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  1282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  1283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  1284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  1285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  1286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  1287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  1288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  1289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  1290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  1292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  1293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  1294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  1295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  1296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  1297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  1298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  1299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  1300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  1301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  1302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  1303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  1304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  1305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  1306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  1307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  1309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  1310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  1311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  1312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  1313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  1314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  1315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  1316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  1317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  1318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  1319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  1320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  1321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  1322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  1323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  1324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  1325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  1326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  1327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  1328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  1329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  1330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  1331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  1333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  1334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  1335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  1336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  1337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  1341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  1342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  1347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  1348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  1349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  1353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  1354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  1359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  1360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  1361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  1365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  1366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  1371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  1374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  1377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  1380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  1383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  1384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  1385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  1389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  1390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  1395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  1396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  1397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  1401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  1402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  1407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  1408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  1409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  1410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  1413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  1414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  1415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  1416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  1417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  1418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  1419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  1422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  1425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  1428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  1429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  1430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  1431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  1432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  1433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  1435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  1436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  1437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  1439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  1440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  1441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  1442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  1443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  1444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  1445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  1446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  1447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  1448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  1449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  1450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  1451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  1452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  1453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  1454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  1455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  1456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  1457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  1458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  1459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  1460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  1461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  1462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  1463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  1464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  1465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  1466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  1467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  1468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  1469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  1470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  1472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  1473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  1474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  1475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  1477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  1478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  1479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  1480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  1482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  1483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  1484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  1486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  1487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  1490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  1491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  1492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  1494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  1495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  1498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  1499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  1500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  1502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  1503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  1506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  1507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  1508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  1510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  1511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  1514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  1515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  1516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  1518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  1519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  1522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  1523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  1524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  1526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  1527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  1530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  1531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  1532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  1533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  1535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  1536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileInfo.Length.get()'</Issue>
  1537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.get()'</Issue>
  1538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.get()'</Issue>
  1539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileSystemInfo.EntryInfo.get()'</Issue>
  1540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.get()'</Issue>
  1541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.get()'</Issue>
  1542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileIcon(string, Shell32.FileAttributes)'</Issue>
  1543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfo(string, FileAttributes, Shell32.FileAttributes, bool)'</Issue>
  1544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32Info.Attributes.get()'</Issue>
  1545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPoint(string)'</Issue>
  1546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  1547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  1548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  1549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  1550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  1551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  1553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  1554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  1555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  1556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  1557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  1558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  1559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  1560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(int, string, string)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  1561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  1562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  1563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  1564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  1565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  1566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  1567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  1568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  1569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  1570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  1571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  1573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  1574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  1575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  1577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  1578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  1579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  1580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  1581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  1582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  1583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  1585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  1586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  1590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  1591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  1592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  1593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  1594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  1595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  1596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  1597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  1598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  1599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  1600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  1601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  1602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  1603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  1604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  1605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  1606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  1607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  1608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  1609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  1610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  1611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  1612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  1614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  1618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  1620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  1621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  1623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  1624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  1625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  1627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  1628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  1629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  1630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  1634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  1635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  1639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  1640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  1641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  1643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  1644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  1645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  1647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  1648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  1649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  1650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  1654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  1655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  1659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  1660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  1661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  1663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  1664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  1665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  1667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  1668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  1671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  1672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  1673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  1675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  1676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  1677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  1679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  1680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  1681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  1683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  1684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  1685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  1686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  1690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  1691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  1695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  1696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  1697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  1698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  1699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  1700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  1702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  1703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  1704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  1705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  1706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  1708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  1709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  1710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  1711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  1712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  1713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  1714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  1715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  1716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  1717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  1718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  1719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  1720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  1721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  1722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  1723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  1724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  1725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  1726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  1727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  1728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  1729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  1730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  1731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  1732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  1733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  1734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  1735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  1736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  1737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  1738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  1739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  1740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  1741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  1742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  1744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  1745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  1746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  1747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  1748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  1749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  1750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  1751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  1752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  1753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  1754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  1755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  1756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  1757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  1758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  1759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  1760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  1761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string)'</Issue>
  1762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string, DosDeviceAttributes)'</Issue>
  1763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string)'</Issue>
  1764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string)'</Issue>
  1765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, DosDeviceAttributes, bool)'</Issue>
  1766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, bool)'</Issue>
  1767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(string, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeLabel(string, string)'</Issue>
  1768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string)'&#xD;&#xA; -&gt;'FileInfo.Length.get()'</Issue>
  1769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  1770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="NativeError.cs" Line="62">'NativeError.ThrowException(uint, string, string)' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'NativeError.ThrowException(uint, string, string)'&#xD;&#xA; -&gt;'OpenResourceInfo.Close()'</Issue>
  1771. </Message>
  1772. </Messages>
  1773. </Member>
  1774. </Members>
  1775. </Type>
  1776. <Type Name="OperatingSystem" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  1777. <Members>
  1778. <Member Name="#IsWow64Process" Kind="Property" Static="True" Accessibility="Public" ExternallyVisible="True">
  1779. <Accessors>
  1780. <Accessor Name="#get_IsWow64Process()" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  1781. <Messages>
  1782. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  1783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="152">'OperatingSystem.IsWow64Process.get()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'&#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'</Issue>
  1784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="152">'OperatingSystem.IsWow64Process.get()' calls into 'Marshal.ThrowExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.ThrowExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'&#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'</Issue>
  1785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="152">'OperatingSystem.IsWow64Process.get()' calls into 'Process.GetCurrentProcess()' which has a LinkDemand. By making this call, 'Process.GetCurrentProcess()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'&#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'</Issue>
  1786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="152">'OperatingSystem.IsWow64Process.get()' calls into 'Process.Handle.get()' which has a LinkDemand. By making this call, 'Process.Handle.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'&#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'</Issue>
  1787. </Message>
  1788. </Messages>
  1789. </Accessor>
  1790. </Accessors>
  1791. </Member>
  1792. <Member Name="#UpdateData()" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  1793. <Messages>
  1794. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  1795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.IsServer.get()'</Issue>
  1796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.OSVersion.get()'</Issue>
  1797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ProcessorArchitecture.get()'</Issue>
  1798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ServicePackVersion.get()'</Issue>
  1799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.VersionName.get()'</Issue>
  1800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.IsServer.get()'</Issue>
  1801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.OSVersion.get()'</Issue>
  1802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ProcessorArchitecture.get()'</Issue>
  1803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ServicePackVersion.get()'</Issue>
  1804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="OperatingSystem.cs" Line="284">'OperatingSystem.UpdateData()' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.VersionName.get()'</Issue>
  1805. </Message>
  1806. </Messages>
  1807. </Member>
  1808. </Members>
  1809. </Type>
  1810. <Type Name="OperatingSystem+NativeMethods" Kind="Class" Accessibility="Private" ExternallyVisible="False">
  1811. <Members>
  1812. <Member Name="#GetNativeSystemInfo(Alphaleonis.Win32.OperatingSystem+NativeMethods+SYSTEM_INFO&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  1813. <Messages>
  1814. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  1815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.IsServer.get()'</Issue>
  1816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.OSVersion.get()'</Issue>
  1817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ProcessorArchitecture.get()'</Issue>
  1818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.ServicePackVersion.get()'</Issue>
  1819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.GetNativeSystemInfo(ref OperatingSystem.NativeMethods.SYSTEM_INFO)'&#xD;&#xA; -&gt;'OperatingSystem.UpdateData()'&#xD;&#xA; -&gt;'OperatingSystem.VersionName.get()'</Issue>
  1820. </Message>
  1821. </Messages>
  1822. </Member>
  1823. <Member Name="#IsWow64Process(System.IntPtr,System.Boolean&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  1824. <Messages>
  1825. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  1826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'OperatingSystem.NativeMethods.IsWow64Process(IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'OperatingSystem.NativeMethods.IsWow64Process(IntPtr, out bool)'&#xD;&#xA; -&gt;'OperatingSystem.IsWow64Process.get()'</Issue>
  1827. </Message>
  1828. </Messages>
  1829. </Member>
  1830. </Members>
  1831. </Type>
  1832. <Type Name="SafeGlobalMemoryBufferHandle" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  1833. <Members>
  1834. <Member Name="#.ctor(System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  1835. <Messages>
  1836. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  1837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  1838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  1839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  1840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  1841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  1842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  1843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  1845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  1846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  1847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  1848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  1850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  1851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  1852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  1855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  1856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  1857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  1858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  1860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  1861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  1862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  1863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  1865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  1866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  1867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  1868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  1869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  1870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  1871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  1872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  1873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  1874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  1875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  1876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  1877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  1878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  1879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  1880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  1881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedConnectionName(string)'</Issue>
  1882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedUncName(string)'</Issue>
  1883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  1884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  1885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  1886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  1887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  1888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  1889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  1890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  1891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  1892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  1893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  1894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  1895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  1896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  1897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  1898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  1899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  1900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  1901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  1902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  1903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  1904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  1905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  1906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  1907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  1909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  1910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  1911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  1912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  1913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  1914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  1915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  1916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  1917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  1918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  1919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  1920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  1921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  1922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  1923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  1924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  1925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  1926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  1927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  1928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  1929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  1930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  1931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  1932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  1933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  1934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  1935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  1936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  1937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  1938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  1939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  1940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  1942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  1943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  1947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  1948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  1950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  1951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  1952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  1953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  1955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  1956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  1957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  1958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  1959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  1960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  1961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  1963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  1964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  1965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  1967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  1968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  1969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  1970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  1971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  1973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  1974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  1975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  1977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  1978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  1979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  1980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  1981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  1982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  1983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  1985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  1986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  1987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  1988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  1989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  1990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  1991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  1992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  1993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  1994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  1995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  1996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  1997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  1998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  1999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  2000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  2001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  2002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  2003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  2004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  2005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  2006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  2007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  2008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  2009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  2010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  2011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  2012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  2013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  2014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  2015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  2016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  2017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  2018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  2019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  2021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  2022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  2023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  2025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  2026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  2028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  2029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  2030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  2031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  2033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  2034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  2035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  2036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  2037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  2038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  2039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  2041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  2042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  2043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  2044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  2045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  2046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  2047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  2048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  2049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  2050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  2052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  2053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  2054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  2055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  2056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  2057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  2058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  2060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  2061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  2062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  2063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  2064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  2065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  2066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  2067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  2068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  2069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  2070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  2071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  2072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  2073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  2075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  2076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  2077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  2078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  2079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  2080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  2081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  2082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  2083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  2084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  2085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  2086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  2087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  2088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  2090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  2091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  2092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  2093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  2094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  2095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  2096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  2097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  2098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  2099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  2100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  2101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  2102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  2103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  2105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  2106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  2108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  2109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  2113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  2117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  2118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  2119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  2120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  2121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  2122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  2123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  2125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  2129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  2130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  2131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  2132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  2133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  2137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  2138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  2139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  2140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  2141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  2142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  2143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  2144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  2145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  2146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  2147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  2149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  2150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  2151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  2152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  2153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  2154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  2158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  2159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  2164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  2165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  2166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  2170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  2171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  2176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  2177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  2178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  2182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  2183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  2188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  2194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  2200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  2201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  2205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  2206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  2207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  2216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  2217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  2221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  2228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  2229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  2232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  2233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  2234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  2235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  2238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  2239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  2240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  2241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  2245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  2248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  2249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  2250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  2251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  2257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  2260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  2264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  2265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  2269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  2276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  2277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  2280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  2281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  2284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  2285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  2286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  2287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  2288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  2289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  2292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  2293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  2294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  2295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  2296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  2300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  2301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  2306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  2307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  2308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  2312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  2313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  2318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  2319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  2320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  2324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  2325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  2330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  2336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  2342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  2343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  2344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  2346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  2347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  2348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  2350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  2351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'Marshal.AllocHGlobal(int)' which has a LinkDemand. By making this call, 'Marshal.AllocHGlobal(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  2352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  2353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  2354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  2355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  2356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  2357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  2358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  2360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  2361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  2362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  2363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  2365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  2366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  2367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  2368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  2370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  2371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  2372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  2373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  2375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  2376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  2377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  2378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  2380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  2381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  2382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  2383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  2384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  2385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  2386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  2387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  2388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  2389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  2390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  2391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  2392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  2393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  2394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  2395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  2396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedConnectionName(string)'</Issue>
  2397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedUncName(string)'</Issue>
  2398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  2399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  2400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  2401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  2402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  2403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  2404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  2405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  2406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  2407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  2408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  2409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  2410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  2411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  2412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  2413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  2414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  2415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  2416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  2417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  2418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  2419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  2420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  2421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  2422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  2424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  2425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  2426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  2427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  2428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  2429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  2430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  2432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  2434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  2435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  2436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  2437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  2438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  2439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  2440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  2441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  2442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  2443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  2444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  2445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  2446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  2447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  2448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  2449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  2450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  2451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  2452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  2453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  2454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  2455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  2456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  2457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  2458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  2459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  2460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  2462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  2463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  2464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  2465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  2466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  2467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  2468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  2470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  2471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  2472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  2473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  2474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  2475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  2476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  2478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  2479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  2480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  2482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  2483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  2484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  2485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  2486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  2488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  2489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  2490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  2492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  2493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  2494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  2495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  2496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  2497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  2498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  2500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  2501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  2502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  2503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  2504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  2505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  2506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  2507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  2509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  2510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  2511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  2513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  2514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  2515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  2516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  2517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  2518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  2519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  2520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  2521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  2522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  2523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  2524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  2525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  2526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  2527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  2528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  2529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  2530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  2531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  2532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  2533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  2534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  2536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  2537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  2538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  2540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  2541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  2543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  2544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  2545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  2546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  2548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  2549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  2550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  2551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  2552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  2553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  2554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  2556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  2557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  2558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  2559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  2560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  2561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  2562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  2563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  2564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  2565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  2567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  2568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  2569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  2570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  2571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  2572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  2573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  2575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  2576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  2577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  2578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  2579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  2580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  2581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  2582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  2583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  2584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  2585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  2586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  2587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  2588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  2590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  2591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  2592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  2593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  2594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  2595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  2596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  2597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  2598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  2599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  2600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  2601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  2602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  2603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  2604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  2605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  2606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  2607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  2608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  2609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  2610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  2611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  2612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  2613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  2614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  2615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  2616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  2617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  2618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  2619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  2620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  2621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  2622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  2623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  2624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  2628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  2632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  2633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  2634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  2635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  2636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  2637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  2638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  2640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  2644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  2645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  2646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  2647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  2648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  2649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  2650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  2651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  2652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  2653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  2654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  2655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  2656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  2657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  2658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  2659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  2660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  2661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  2662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  2664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  2665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  2666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  2667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  2668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  2669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  2673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  2674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  2679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  2680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  2681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  2685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  2686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  2691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  2692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  2693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  2697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  2698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  2703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  2709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  2715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  2716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  2720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  2721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  2722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  2731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  2732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  2736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  2743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  2744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  2747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  2748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  2749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  2750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  2753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  2754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  2755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  2756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  2760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  2763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  2764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  2765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  2766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  2772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  2775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  2779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  2780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  2784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  2791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  2792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  2795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  2796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  2799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  2800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  2801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  2802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  2803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  2804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  2807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  2808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  2809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  2810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  2811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  2815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  2816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  2821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  2822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  2823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  2827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  2828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  2833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  2834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  2835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  2839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  2840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  2845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  2851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  2857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  2858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  2859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  2861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  2862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  2863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  2865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  2866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="40">'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  2867. </Message>
  2868. </Messages>
  2869. </Member>
  2870. <Member Name="#FromLong(System.Nullable`1&lt;System.Int64&gt;)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="False">
  2871. <Messages>
  2872. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  2873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  2874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  2875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  2876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  2880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  2881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  2886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  2887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  2888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  2892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  2893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  2898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  2899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  2900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  2901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  2904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  2905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  2906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  2907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  2908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  2909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  2910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  2916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  2919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  2920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  2921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  2922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  2923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  2927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  2928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  2929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  2938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  2939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  2943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  2950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  2951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  2954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  2955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  2956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  2957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  2960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  2961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  2962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  2963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  2966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  2967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  2970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  2971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  2972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  2973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  2974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  2975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  2976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  2978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  2979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  2980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  2982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  2984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  2985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  2986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  2987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  2990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  2991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  2992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  2993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  2994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  2995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  2996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  2997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  2998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  2999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  3003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  3006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  3007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  3008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  3009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  3010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  3011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  3015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  3016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  3017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  3018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  3022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  3023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  3028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  3029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  3030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  3034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  3035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  3040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  3041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  3042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  3046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  3047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  3052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  3058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  3064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  3065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  3068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  3069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  3072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  3073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  3074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  3075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  3076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  3077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  3081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  3082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  3087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  3088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  3089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  3093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  3094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  3099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  3100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  3101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  3105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  3106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  3111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  3117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  3123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  3124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  3128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  3129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  3130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  3139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  3140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  3144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  3151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  3152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  3156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  3157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  3158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  3162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  3163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  3164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  3168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  3171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  3172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  3173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  3174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  3180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  3183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  3187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  3188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  3192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  3199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  3200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  3204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  3207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  3208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  3209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  3210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  3211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  3212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  3216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  3217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  3218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  3219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  3223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  3224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  3229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  3230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  3231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  3235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  3236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  3241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  3242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  3243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  3247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  3248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  3253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  3259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  3265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  3266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  3269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  3270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  3273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  3274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeGlobalMemoryBufferHandle.cs" Line="52">'SafeGlobalMemoryBufferHandle.FromLong(long?)' calls into 'Marshal.WriteInt64(IntPtr, long)' which has a LinkDemand. By making this call, 'Marshal.WriteInt64(IntPtr, long)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  3275. </Message>
  3276. </Messages>
  3277. </Member>
  3278. </Members>
  3279. </Type>
  3280. <Type Name="SafeNativeMemoryBufferHandle" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  3281. <Members>
  3282. <Member Name="#.ctor(System.Boolean)" Kind="Method" Static="False" Accessibility="Family" ExternallyVisible="False">
  3283. <Messages>
  3284. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  3285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  3286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  3287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  3288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  3289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  3290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  3291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  3292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  3293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  3294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  3295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  3296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  3297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  3299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  3300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  3301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  3302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  3303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  3304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  3305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  3308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  3309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  3310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  3311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  3312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  3313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  3316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  3318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  3319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  3320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  3321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  3322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  3323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  3324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  3325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  3326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  3327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  3328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  3329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  3330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  3331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  3332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  3333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  3334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  3335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  3336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  3337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  3338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  3339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  3341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  3342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  3343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  3346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  3347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  3349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  3350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  3351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  3354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  3355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  3356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  3357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  3358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  3359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  3360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  3362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  3363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  3364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  3366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  3367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  3368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  3369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  3370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  3372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  3373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  3374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  3376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  3377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  3378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  3379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  3380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  3381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  3382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  3383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  3384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  3385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  3386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  3387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  3388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  3389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  3390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  3391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  3393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  3394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  3395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  3396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  3397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  3398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  3399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  3400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  3401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  3402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  3403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  3404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  3405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  3406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  3407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  3408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  3409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  3410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  3411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  3412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  3413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  3414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  3415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  3416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  3417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  3418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  3420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  3421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  3422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  3423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  3425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  3426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  3427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  3428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  3430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  3431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  3432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  3433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  3435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  3436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  3437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  3439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  3440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  3441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  3442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  3444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  3445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  3446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  3447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  3448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  3449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  3450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  3451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  3452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  3453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  3454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  3456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  3457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  3458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  3459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  3460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  3461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  3462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  3464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  3465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  3466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  3467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  3468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  3469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  3470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  3471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  3472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  3473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  3475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  3476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  3477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  3478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  3479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  3480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  3481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  3482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  3483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  3484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  3485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  3486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  3487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  3488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  3489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  3490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  3491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  3492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  3493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  3494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  3495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  3496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  3497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  3498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  3499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  3500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  3501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  3502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  3503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  3504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  3505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  3506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  3507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  3508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  3509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  3510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  3511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  3513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  3514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  3515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  3516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  3517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  3518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  3519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  3520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  3521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  3522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  3523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  3524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  3525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  3526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  3527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  3528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  3529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  3530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  3531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  3532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  3533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  3534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  3535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  3536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  3537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  3538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  3539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  3540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  3541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  3542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  3543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  3544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  3545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  3546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  3548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  3549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  3550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  3551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  3552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  3553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  3554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  3555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  3556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  3557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  3558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  3559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  3560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  3561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  3562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  3563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  3564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  3565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  3566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  3567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  3568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  3569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  3570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  3572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  3573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  3574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  3575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  3576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  3577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  3581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  3582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  3587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  3588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  3589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  3593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  3594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  3599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  3600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  3601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  3605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  3606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  3611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  3617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  3623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  3624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  3628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  3629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  3630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  3639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  3640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  3644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  3651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  3652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  3656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  3657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  3658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  3662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  3663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  3664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  3668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  3671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  3672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  3673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  3674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  3680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  3683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  3687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  3688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  3692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  3699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  3700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  3704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  3707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  3708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  3709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  3710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  3711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  3712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  3716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  3717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  3718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  3719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  3723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  3724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  3729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  3730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  3731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  3735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  3736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  3741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  3742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  3743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  3744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  3747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  3748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  3749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  3750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  3751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  3752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  3753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  3759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  3762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  3763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  3764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  3765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  3766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  3769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  3770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  3771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  3773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  3774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle()'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.FromLong(long?)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  3775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  3776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  3777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  3778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  3779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  3780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  3781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  3782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  3783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  3784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  3785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  3786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  3787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  3788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  3789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  3790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  3791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  3792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  3793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  3794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  3795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedConnectionName(string)'</Issue>
  3796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedUncName(string)'</Issue>
  3797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  3798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  3799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="40">'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.SafeNativeMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'SafeGlobalMemoryBufferHandle.SafeGlobalMemoryBufferHandle(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  3800. </Message>
  3801. </Messages>
  3802. </Member>
  3803. <Member Name="#CopyFrom(System.Byte[],System.Int32,System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  3804. <Messages>
  3805. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  3806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  3807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  3808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  3809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  3810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  3811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  3812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  3813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  3814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  3815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  3816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  3817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  3818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  3819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  3820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  3821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  3822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  3823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  3824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  3825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  3826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  3830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  3831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  3832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  3841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  3842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  3846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  3853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  3854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  3858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  3859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  3860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  3863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  3864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  3865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  3866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  3867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  3868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  3869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  3870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  3871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  3872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  3873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  3874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  3875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  3876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  3878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  3879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  3880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  3881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  3882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  3883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  3884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  3887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  3888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  3889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  3890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  3891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  3892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  3893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  3895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  3897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  3898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  3899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  3900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  3901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  3902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  3903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  3904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  3905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  3906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  3907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  3908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  3909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  3910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  3911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  3912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  3913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  3914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  3915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  3916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  3917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  3918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  3920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  3921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  3922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  3925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  3926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  3928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  3929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  3930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  3931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  3933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  3934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  3935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  3936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  3937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  3938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  3939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  3941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  3942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  3943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  3945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  3946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  3947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  3948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  3949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  3951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  3952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  3953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  3954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  3955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  3956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  3957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  3958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  3961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  3962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  3965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  3966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  3967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  3968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  3969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  3970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  3973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  3974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  3977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  3979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  3980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  3981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  3982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  3985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  3986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  3987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  3988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  3989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  3991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  3992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  3993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  3994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  3995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  3996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  3997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  3998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  3999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  4001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  4002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  4003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  4004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  4005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  4006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  4009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  4010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  4011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  4012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  4013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  4014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  4015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  4016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  4017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  4018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  4019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  4020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  4021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  4022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  4023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  4024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  4026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  4027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  4028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  4029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  4030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  4031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  4032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  4033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  4034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  4035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  4037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  4038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  4039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  4040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  4041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  4042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  4043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  4045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  4046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  4047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  4048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  4049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  4050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  4054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  4058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  4059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  4060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  4064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  4072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  4073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  4074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  4075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  4077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  4078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  4079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  4080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  4081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  4082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  4083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  4084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  4085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  4086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  4087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  4089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  4090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  4091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  4092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  4093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  4094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  4095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  4097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  4098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  4099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  4100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  4101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  4102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  4103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  4104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  4105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  4106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  4108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  4109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  4110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  4111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  4112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  4113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  4114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  4115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  4116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  4117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  4118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  4119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  4120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  4121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  4122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  4123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  4124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  4125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  4126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  4127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  4128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  4129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  4130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  4131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  4132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  4133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  4134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  4135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  4136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  4137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  4138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  4139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  4140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  4141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  4142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  4143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  4144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  4146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  4147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  4148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  4149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  4150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  4151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  4152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  4153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  4154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  4155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  4156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  4157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  4158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  4159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  4160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  4161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  4162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  4163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  4164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  4165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  4166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  4167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  4168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  4169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  4170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  4171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  4172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  4173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  4174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  4175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  4176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  4177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  4178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  4179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  4181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  4182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  4183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  4184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  4185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  4186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  4187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  4188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  4189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  4190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  4191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  4192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  4193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  4194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  4195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  4196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  4197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  4198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  4199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  4200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  4201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  4202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  4203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  4205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  4206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  4207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  4208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  4209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  4213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  4214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  4219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  4220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  4221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  4225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  4226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  4231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  4232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  4233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  4237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  4238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  4243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  4246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  4249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  4252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  4255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  4256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  4257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  4261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  4262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  4267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  4268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  4269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  4273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  4274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  4279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  4280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  4281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  4282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  4285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  4286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  4287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  4288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  4289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  4290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  4291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  4294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  4297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  4300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  4301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  4302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  4303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  4304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  4305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  4307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  4308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  4309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  4311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  4312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  4313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="79">'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)' calls into 'Marshal.Copy(byte[], int, IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(byte[], int, IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyFrom(byte[], int, int)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  4314. </Message>
  4315. </Messages>
  4316. </Member>
  4317. <Member Name="#CopyTo(System.Byte[],System.Int32,System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4318. <Messages>
  4319. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="98">'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  4321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="98">'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(byte[], int, int)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  4322. </Message>
  4323. </Messages>
  4324. </Member>
  4325. <Member Name="#CopyTo(System.Int32,System.Byte[],System.Int32,System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4326. <Messages>
  4327. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="123">'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="123">'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="123">'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="123">'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.CopyTo(int, byte[], int, int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4332. </Message>
  4333. </Messages>
  4334. </Member>
  4335. <Member Name="#PtrToStringUni(System.Int32,System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4336. <Messages>
  4337. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="288">'SafeNativeMemoryBufferHandle.PtrToStringUni(int, int)' calls into 'Marshal.PtrToStringUni(IntPtr, int)' which has a LinkDemand. By making this call, 'Marshal.PtrToStringUni(IntPtr, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStringUni(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStringUni(int, int)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  4339. </Message>
  4340. </Messages>
  4341. </Member>
  4342. <Member Name="#PtrToStructure`1(System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4343. <Messages>
  4344. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  4346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  4351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  4352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  4353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  4357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  4361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  4362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  4363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  4367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string)'</Issue>
  4371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string, string, string)'</Issue>
  4372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsInfo(string)'</Issue>
  4373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedConnectionName(string)'</Issue>
  4374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedUncName(string)'</Issue>
  4375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  4376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  4377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  4378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(ShareInfoLevel, string, bool)'</Issue>
  4379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(ShareInfoLevel, string, string, bool)'</Issue>
  4380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(string, bool)'</Issue>
  4381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(string, string, bool)'</Issue>
  4382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="281">'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.PtrToStructure&lt;T&gt;(int)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'ShareInfo.ResourceType.get()'</Issue>
  4383. </Message>
  4384. </Messages>
  4385. </Member>
  4386. <Member Name="#StructureToPtr(System.Object,System.Boolean)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4387. <Messages>
  4388. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  4390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  4391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  4392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  4396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  4400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  4401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  4402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  4403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  4405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  4406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  4407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  4408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="274">'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)' calls into 'Marshal.StructureToPtr(object, IntPtr, bool)' which has a LinkDemand. By making this call, 'Marshal.StructureToPtr(object, IntPtr, bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.StructureToPtr(object, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4409. </Message>
  4410. </Messages>
  4411. </Member>
  4412. <Member Name="#ToByteArray(System.Int32,System.Int32)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="False">
  4413. <Messages>
  4414. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  4416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  4417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  4419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  4420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  4421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  4422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  4423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  4424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  4425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  4427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  4428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  4429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  4430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  4431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  4432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'Marshal.Copy(IntPtr, byte[], int, int)' which has a LinkDemand. By making this call, 'Marshal.Copy(IntPtr, byte[], int, int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  4433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  4434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  4435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  4437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  4438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  4439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  4440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  4441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  4442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  4443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  4444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  4445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  4446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  4447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  4448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  4449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  4450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS" File="SafeNativeMemoryBufferHandle.cs" Line="143">'SafeNativeMemoryBufferHandle.ToByteArray(int, int)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'SafeNativeMemoryBufferHandle.ToByteArray(int, int)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  4451. </Message>
  4452. </Messages>
  4453. </Member>
  4454. </Members>
  4455. </Type>
  4456. </Types>
  4457. </Namespace>
  4458. <Namespace Name="Alphaleonis.Win32.Filesystem">
  4459. <Types>
  4460. <Type Name="BackupFileStream" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  4461. <Members>
  4462. <Member Name="#.ctor(Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.FileSystemRights)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4463. <Messages>
  4464. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="48">'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'</Issue>
  4466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="48">'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'</Issue>
  4467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="48">'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(SafeFileHandle, FileSystemRights)'</Issue>
  4468. </Message>
  4469. </Messages>
  4470. </Member>
  4471. <Member Name="#Flush()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4472. <Messages>
  4473. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="434">'BackupFileStream.Flush()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.Flush()'&#xD;&#xA; -&gt;'BackupFileStream.Flush()'</Issue>
  4475. </Message>
  4476. </Messages>
  4477. </Member>
  4478. <Member Name="#GetAccessControl()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4479. <Messages>
  4480. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="477">'BackupFileStream.GetAccessControl()' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  4482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="477">'BackupFileStream.GetAccessControl()' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  4483. </Message>
  4484. </Messages>
  4485. </Member>
  4486. <Member Name="#Lock(System.Int64,System.Int64)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4487. <Messages>
  4488. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="535">'BackupFileStream.Lock(long, long)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.Lock(long, long)'&#xD;&#xA; -&gt;'BackupFileStream.Lock(long, long)'</Issue>
  4490. </Message>
  4491. </Messages>
  4492. </Member>
  4493. <Member Name="#ReadStreamInfo()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4494. <Messages>
  4495. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="575">'BackupFileStream.ReadStreamInfo()' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  4497. </Message>
  4498. </Messages>
  4499. </Member>
  4500. <Member Name="#Skip(System.Int64)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4501. <Messages>
  4502. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="453">'BackupFileStream.Skip(long)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.Skip(long)'&#xD;&#xA; -&gt;'BackupFileStream.Skip(long)'</Issue>
  4504. </Message>
  4505. </Messages>
  4506. </Member>
  4507. <Member Name="#Unlock(System.Int64,System.Int64)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4508. <Messages>
  4509. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="BackupFileStream.cs" Line="555">'BackupFileStream.Unlock(long, long)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'BackupFileStream.Unlock(long, long)'&#xD;&#xA; -&gt;'BackupFileStream.Unlock(long, long)'</Issue>
  4511. </Message>
  4512. </Messages>
  4513. </Member>
  4514. </Members>
  4515. </Type>
  4516. <Type Name="Device" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  4517. <Members>
  4518. <Member Name="#GetLinkTargetInfoCore(Microsoft.Win32.SafeHandles.SafeFileHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  4519. <Messages>
  4520. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.OffsetOf(Type, string)' which has a LinkDemand. By making this call, 'Marshal.OffsetOf(Type, string)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.OffsetOf(Type, string)' which has a LinkDemand. By making this call, 'Marshal.OffsetOf(Type, string)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.OffsetOf(Type, string)' which has a LinkDemand. By making this call, 'Marshal.OffsetOf(Type, string)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'Marshal.OffsetOf(Type, string)' which has a LinkDemand. By making this call, 'Marshal.OffsetOf(Type, string)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  4530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  4531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  4532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="248">'Device.GetLinkTargetInfoCore(SafeFileHandle)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4533. </Message>
  4534. </Messages>
  4535. </Member>
  4536. <Member Name="#InvokeIoControlUnknownSize`1(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,!!0,System.UInt32)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  4537. <Messages>
  4538. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  4540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  4541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  4543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  4544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  4545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  4548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  4549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  4551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  4552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  4553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  4556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  4557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  4558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  4559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  4560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  4561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  4564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  4565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  4566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  4567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  4568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  4569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  4572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  4574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  4576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  4577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  4580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  4581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  4582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  4583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  4586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  4588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  4589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  4592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  4593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  4594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  4595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  4598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  4599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  4600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  4601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  4602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  4603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  4604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  4605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  4606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  4607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  4608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  4609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  4610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  4611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  4613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  4614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  4615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  4616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  4617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  4618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  4619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  4622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  4623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  4624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  4625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  4626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  4627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  4630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  4632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  4633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  4634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  4635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  4636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  4637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  4638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  4639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  4640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  4641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  4642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  4643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  4644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  4646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  4647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  4648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  4650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  4651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  4652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  4653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  4654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  4656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  4657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  4658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  4660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  4661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  4662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  4663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  4665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  4666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  4667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  4670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  4671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  4673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  4674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  4675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  4676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  4678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  4679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  4680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  4681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  4682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  4683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  4686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  4687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  4688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  4689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  4690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  4691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  4694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  4696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  4698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  4699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  4702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  4703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  4704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  4705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  4708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  4710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  4711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  4714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  4715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  4716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  4717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  4720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  4721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  4722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  4723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  4724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  4725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  4726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  4727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  4728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  4729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  4730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  4731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  4732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  4733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  4735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  4736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  4737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  4738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  4739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  4740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  4741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  4744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  4745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  4746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  4747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  4748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  4749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  4752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  4754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  4755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  4756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  4757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  4758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  4759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  4760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  4761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  4762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  4763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  4764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  4765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  4766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  4768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  4769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  4770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  4772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  4773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  4774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  4775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  4776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  4778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  4779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  4780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  4782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Device.cs" Line="413">'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  4783. </Message>
  4784. </Messages>
  4785. </Member>
  4786. </Members>
  4787. </Type>
  4788. <Type Name="Directory" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  4789. <Members>
  4790. <Member Name="#CreateDirectoryCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.String,System.Security.AccessControl.ObjectSecurity,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  4791. <Messages>
  4792. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  4794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  4795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  4798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  4799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  4800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  4801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  4802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  4803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  4806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  4808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  4810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  4811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  4814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  4815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  4816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  4817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  4820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  4822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  4823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  4826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  4827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  4828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  4829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  4832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  4833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  4834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  4835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  4836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  4837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  4838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  4839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  4840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  4841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  4842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  4843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  4844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  4845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  4847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  4848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  4849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  4850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  4851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  4852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  4853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  4856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  4857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  4858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  4859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  4860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  4861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  4862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  4864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  4866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  4867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  4868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  4869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  4870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  4871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  4872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  4873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  4874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CreateDirectory.cs" Line="686">'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  4875. </Message>
  4876. </Messages>
  4877. </Member>
  4878. <Member Name="#DeleteDirectoryCore(Alphaleonis.Win32.Filesystem.FileSystemEntryInfo,Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.Boolean,System.Boolean,System.Boolean,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  4879. <Messages>
  4880. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  4882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  4883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  4886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  4887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  4888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  4889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  4890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  4891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  4894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  4896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  4898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  4899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  4902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  4903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  4904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  4905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  4908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  4910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  4911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  4914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  4915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  4916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  4917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  4918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  4920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  4921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  4922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  4923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  4924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  4925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  4926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  4927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  4928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  4929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  4930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  4931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  4932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  4933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  4934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  4935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  4936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  4937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  4938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  4939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  4940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  4941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  4942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  4943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  4944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  4945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  4946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.Delete.cs" Line="275">'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  4947. </Message>
  4948. </Messages>
  4949. </Member>
  4950. <Member Name="#GetCurrentDirectory()" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  4951. <Messages>
  4952. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CurrentDirectory.cs" Line="48">'Directory.GetCurrentDirectory()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.GetCurrentDirectory()'&#xD;&#xA; -&gt;'Directory.GetCurrentDirectory()'</Issue>
  4954. </Message>
  4955. </Messages>
  4956. </Member>
  4957. <Member Name="#SetCurrentDirectory(System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  4958. <Messages>
  4959. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Directory Class" File="Directory.CurrentDirectory.cs" Line="105">'Directory.SetCurrentDirectory(string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  4961. </Message>
  4962. </Messages>
  4963. </Member>
  4964. </Members>
  4965. </Type>
  4966. <Type Name="DiskSpaceInfo" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  4967. <Members>
  4968. <Member Name="#Refresh()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  4969. <Messages>
  4970. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="DiskSpaceInfo.cs" Line="104">'DiskSpaceInfo.Refresh()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  4972. </Message>
  4973. </Messages>
  4974. </Member>
  4975. </Members>
  4976. </Type>
  4977. <Type Name="File" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  4978. <Members>
  4979. <Member Name="#CopyMoveCore(System.Boolean,Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.String,System.Boolean,System.Nullable`1&lt;Alphaleonis.Win32.Filesystem.CopyOptions&gt;,System.Nullable`1&lt;Alphaleonis.Win32.Filesystem.MoveOptions&gt;,Alphaleonis.Win32.Filesystem.CopyMoveProgressRoutine,System.Object,Alphaleonis.Win32.Filesystem.CopyMoveResult,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  4980. <Messages>
  4981. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  4982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  4983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  4984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  4987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  4988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  4989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  4990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  4991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  4992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  4993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  4994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  4995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  4996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  4997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  4998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  4999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  5000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  5004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  5011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  5012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  5016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  5017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  5018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  5022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  5023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  5024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  5028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  5031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  5032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  5033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  5034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  5040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  5043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  5047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  5048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  5052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  5059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  5060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  5064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  5067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  5068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  5069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  5070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  5071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  5072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  5076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  5077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  5078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  5082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  5083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  5084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  5093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  5094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  5098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  5105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  5106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  5110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  5111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  5112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  5116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  5117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  5118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  5122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  5125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  5126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  5127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  5128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  5134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  5137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  5141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  5142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  5146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  5153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  5154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  5158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  5161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  5162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  5163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  5164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  5165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  5166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CopyMove.cs" Line="1085">'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  5170. </Message>
  5171. </Messages>
  5172. </Member>
  5173. <Member Name="#CreateFileCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,Alphaleonis.Win32.Filesystem.ExtendedFileAttributes,System.Security.AccessControl.FileSecurity,System.IO.FileMode,System.Security.AccessControl.FileSystemRights,System.IO.FileShare,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  5174. <Messages>
  5175. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  5176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  5177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  5178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  5179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  5180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  5181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  5182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  5183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  5184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  5185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  5186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  5187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  5188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  5190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  5191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  5192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  5195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  5196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  5198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  5199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  5200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  5203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  5204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  5205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  5206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  5207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  5208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  5212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  5213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  5214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  5223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  5224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  5228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  5235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  5236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  5240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  5241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  5242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  5246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  5247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  5248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  5249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  5250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  5251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  5252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  5253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  5254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  5255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  5256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  5257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  5258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  5260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  5261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  5262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  5263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  5264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  5265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  5266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  5269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  5270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  5271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  5272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  5273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  5274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  5277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  5279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  5280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  5281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  5282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  5283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  5284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  5285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  5286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  5287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  5288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  5289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  5290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  5291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  5293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  5294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  5295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  5297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  5298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  5299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  5300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  5301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  5303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  5304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  5305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  5307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  5308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  5309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  5310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  5314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  5317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  5318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  5319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  5320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  5326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  5329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  5333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  5334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  5338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  5345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  5346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  5350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  5353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  5354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  5355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  5356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  5357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  5358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  5362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  5363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  5364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  5365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  5366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  5367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  5369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  5370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  5371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  5372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  5373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  5374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  5376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  5378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  5379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  5380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  5382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  5383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  5384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  5385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  5386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  5387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  5388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  5389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  5390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  5391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  5392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  5393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  5394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  5395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  5396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  5397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  5398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  5399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  5400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  5401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  5402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  5403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  5405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  5406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  5407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  5408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  5410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  5411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  5412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  5413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  5415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  5416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  5417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  5418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  5420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  5421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  5422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  5424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  5425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  5426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  5427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  5429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  5430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  5431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  5433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  5434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  5436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  5437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  5438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  5439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  5441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  5442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  5443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  5444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  5445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  5446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  5449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  5450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  5451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  5452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  5453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  5454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  5455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  5456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  5457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  5458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  5460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  5461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  5462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  5463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  5464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  5465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  5466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  5468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  5469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  5470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  5471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  5472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  5473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  5474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  5475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  5476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  5477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  5478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  5479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  5480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  5481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  5483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  5484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  5485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  5486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  5487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  5488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  5489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  5490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  5491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  5492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  5493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  5494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  5495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  5498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  5499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  5500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  5501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  5502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  5503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  5504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  5505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  5506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  5507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  5508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  5509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  5510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  5511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  5513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  5514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  5516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  5517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  5518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  5519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  5520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  5521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  5522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  5523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  5524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  5525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  5526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  5527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  5528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  5529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  5530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  5531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  5533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  5534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  5535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  5536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  5537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  5538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  5539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  5540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  5541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  5542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  5543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  5544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  5545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  5546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  5547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  5548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  5549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  5550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  5551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  5552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  5553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  5554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  5555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  5557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  5558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  5559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  5560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  5561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  5565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  5566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  5571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  5572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  5573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  5577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  5578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  5583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  5584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  5585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  5589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  5590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  5595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  5598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  5601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  5604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  5607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  5608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  5609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  5613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  5614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  5619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  5620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  5621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  5625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  5626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  5631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  5632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  5633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  5634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  5637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  5638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  5639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  5640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  5641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  5642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  5643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  5646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  5649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  5652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  5653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  5654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  5655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  5656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  5657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  5659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  5660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  5661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  5663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  5664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  5665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  5666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  5667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  5668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  5669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  5670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  5671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  5672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  5673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  5674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  5675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  5676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  5677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  5679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  5680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  5681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  5684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  5685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  5687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  5688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  5689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  5690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  5692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  5693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  5694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  5695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  5696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  5697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  5701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  5702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  5703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  5712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  5713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  5717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  5724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  5725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  5729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  5730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  5731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  5735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  5736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  5737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  5738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  5739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  5740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  5741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  5742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  5743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  5744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  5745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  5746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  5747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  5749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  5750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  5751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  5752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  5753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  5754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  5755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  5758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  5759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  5760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  5761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  5762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  5763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  5764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  5766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  5768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  5769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  5770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  5771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  5772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  5773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  5774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  5775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  5776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  5777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  5778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  5779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  5780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  5782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  5783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  5784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  5786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  5787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  5788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  5789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  5790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  5792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  5793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  5794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  5796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  5797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  5798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  5799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  5802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  5803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  5806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  5807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  5808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  5809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  5810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  5811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  5814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  5815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  5818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  5820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  5821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  5822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  5823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  5826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  5827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  5828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  5829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  5832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  5833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  5834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  5835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  5836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  5838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  5839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  5840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  5842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  5843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  5844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  5845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  5846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  5847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  5848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  5849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  5850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  5851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  5852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  5853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  5854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  5855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  5856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  5858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  5859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  5860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  5861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  5862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  5863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  5865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  5867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  5868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  5869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  5871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  5872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  5873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  5874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  5875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  5876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  5877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  5878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  5879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  5880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  5881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  5882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  5883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  5884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  5885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  5886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  5887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  5888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  5889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  5890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  5891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  5892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  5894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  5895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  5896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  5897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  5899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  5900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  5901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  5902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  5904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  5905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  5906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  5907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  5909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  5910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  5911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  5913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  5914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  5915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  5916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  5918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  5919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  5920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  5922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  5923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  5924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  5925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  5926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  5927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  5928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  5930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  5931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  5932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  5933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  5934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  5935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  5938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  5939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  5940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  5941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  5942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  5943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  5944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  5945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  5946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  5947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  5949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  5950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  5951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  5952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  5953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  5954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  5955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  5957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  5958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  5959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  5960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  5961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  5962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  5963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  5964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  5965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  5966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  5967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  5968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  5969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  5970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  5971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  5972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  5973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  5974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  5975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  5976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  5977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  5978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  5979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  5980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  5981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  5982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  5983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  5984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  5985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  5986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  5987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  5988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  5989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  5990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  5991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  5992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  5993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  5994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  5995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  5996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  5997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  5998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  5999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  6000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  6001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  6002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  6003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  6005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  6006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  6010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  6014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  6015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  6016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  6017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  6018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  6019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  6020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  6022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  6026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  6027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  6028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  6029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  6030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  6034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  6035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  6036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  6037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  6038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  6039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  6040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  6041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  6042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  6043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  6044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  6046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  6047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  6048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  6049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  6050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  6054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  6055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  6060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  6061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  6062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  6066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  6067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  6072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  6073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  6074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  6078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  6079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  6084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  6090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  6096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  6097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  6098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  6102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  6103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  6108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  6109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  6110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  6114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  6115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  6120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  6121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  6122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  6126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  6127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  6132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  6138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  6144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  6145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  6146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  6148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  6149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  6150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  6152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  6153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  6154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  6155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  6156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  6157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  6158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  6159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  6160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  6161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  6162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  6163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  6164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  6165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  6166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  6167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  6168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  6169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  6170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  6171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  6173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  6174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  6175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  6176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  6177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  6178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  6179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  6181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  6182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  6183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  6184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  6185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  6186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  6189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  6190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  6191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  6192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  6193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  6194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  6197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  6199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  6201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  6202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  6205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  6206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  6207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  6208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  6211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  6213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  6214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  6217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  6218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  6219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  6220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  6223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  6224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  6225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  6226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  6227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  6228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  6229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  6230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  6231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  6232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  6233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  6234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  6235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  6236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  6238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  6239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  6240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  6241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  6242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  6243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  6244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  6247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  6249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  6250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  6251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  6252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  6255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  6257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  6258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  6259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  6260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  6261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  6262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  6263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  6264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  6265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  6266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  6267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  6268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  6269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  6271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  6272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  6273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  6275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  6276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  6277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  6278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  6279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  6281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  6282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  6283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  6285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  6286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  6287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  6288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  6291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  6292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  6295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  6296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  6297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  6298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  6299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  6300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  6303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  6304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  6307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  6309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  6311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  6312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  6315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  6316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  6317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  6318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  6321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  6323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  6324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  6327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  6328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  6331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  6332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  6333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  6334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  6335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  6336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  6339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  6340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  6341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  6342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  6343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  6344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  6345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  6347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  6348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  6349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  6350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  6351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  6352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  6353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  6354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  6356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  6357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  6358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  6360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  6361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  6362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  6363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  6364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  6365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  6366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  6367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  6368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  6369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  6370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  6371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  6372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  6373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  6374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  6375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  6376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  6377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  6378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  6379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  6380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  6381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  6383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  6384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  6385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  6386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  6388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  6389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  6390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  6391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  6393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  6394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  6395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  6396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  6398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  6399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  6400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  6402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  6403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  6404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  6405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  6407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  6408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  6409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  6410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  6411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  6412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  6414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  6415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  6416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  6417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  6419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  6420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  6421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  6422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  6423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  6424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  6425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  6427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  6428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  6429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  6430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  6431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  6432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  6433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  6434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  6435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  6436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  6438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  6439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  6440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  6441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  6442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  6443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  6444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  6445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  6446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  6447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  6448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  6449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  6450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  6451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  6452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  6453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  6454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  6455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  6456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  6457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  6458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  6459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  6460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  6461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  6462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  6463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  6464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  6465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  6466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  6467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  6468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  6469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  6470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  6471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  6472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  6473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  6474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  6476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  6477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  6478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  6479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  6480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  6481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  6482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  6483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  6484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  6485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  6486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  6487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  6488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  6489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  6490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  6491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  6492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  6494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  6495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  6499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  6503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  6504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  6505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  6506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  6507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  6508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  6509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  6511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  6515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  6516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  6517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  6518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  6519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  6520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  6521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  6522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  6523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  6524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  6525. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  6526. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  6527. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  6528. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  6529. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  6530. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  6531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  6532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  6533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  6535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  6536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  6537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  6538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  6539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  6543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  6544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  6549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  6550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  6551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  6555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  6556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  6561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  6562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  6563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  6567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  6568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  6573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  6579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  6585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  6586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  6587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  6591. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  6592. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6593. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6594. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6595. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6596. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  6597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  6598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  6599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6601. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6602. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  6603. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  6604. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6605. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6606. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  6609. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  6610. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  6611. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  6612. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  6615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  6616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  6617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  6618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  6619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  6620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  6621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  6627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  6630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  6631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  6632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  6633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  6634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  6635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  6637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  6638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  6639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  6641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  6642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="357">'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  6643. </Message>
  6644. </Messages>
  6645. </Member>
  6646. <Member Name="#CreateFileStreamCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,Alphaleonis.Win32.Filesystem.ExtendedFileAttributes,System.Security.AccessControl.FileSecurity,System.IO.FileMode,System.IO.FileAccess,System.IO.FileShare,System.Int32,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6647. <Messages>
  6648. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  6650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  6651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  6652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  6653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  6654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  6656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  6657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  6658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  6659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  6660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  6661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  6662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  6663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  6665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  6666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  6667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  6668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  6669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  6670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  6671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Create.cs" Line="318">'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  6672. </Message>
  6673. </Messages>
  6674. </Member>
  6675. <Member Name="#CreateHardlinkCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6676. <Messages>
  6677. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateHardlink.cs" Line="98">'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  6679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateHardlink.cs" Line="98">'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  6680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateHardlink.cs" Line="98">'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  6681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateHardlink.cs" Line="98">'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6682. </Message>
  6683. </Messages>
  6684. </Member>
  6685. <Member Name="#CreateSymbolicLinkCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.String,Alphaleonis.Win32.Filesystem.SymbolicLinkTarget,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6686. <Messages>
  6687. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateSymbolicLink.cs" Line="109">'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  6689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateSymbolicLink.cs" Line="109">'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  6690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateSymbolicLink.cs" Line="109">'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  6691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.CreateSymbolicLink.cs" Line="109">'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  6692. </Message>
  6693. </Messages>
  6694. </Member>
  6695. <Member Name="#DeleteFileCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6696. <Messages>
  6697. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  6699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  6700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  6703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  6704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  6705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  6706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  6707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  6708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  6711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  6713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  6715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  6716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  6719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  6720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  6721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  6722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  6725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  6727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  6728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  6731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  6732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  6733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  6734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  6737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  6738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  6739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  6740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  6741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  6742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  6743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  6744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  6745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  6746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  6747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  6748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  6749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  6751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  6752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  6753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  6754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  6755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  6756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  6758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  6760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  6761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  6762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  6763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  6764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  6765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  6766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  6767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  6768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  6769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  6771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Delete.cs" Line="154">'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  6772. </Message>
  6773. </Messages>
  6774. </Member>
  6775. <Member Name="#EncryptDecryptFileCore(System.Boolean,System.String,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6776. <Messages>
  6777. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  6779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  6780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  6781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  6782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  6783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  6784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  6785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  6786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  6787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  6788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  6789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  6790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  6791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  6792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  6793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  6794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  6795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptDecrypt.cs" Line="83">'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  6796. </Message>
  6797. </Messages>
  6798. </Member>
  6799. <Member Name="#FillAttributeInfoCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FILE_ATTRIBUTE_DATA&amp;,System.Boolean,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  6800. <Messages>
  6801. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  6802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  6803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  6804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  6807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  6808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  6809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  6810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  6811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  6812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  6815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  6817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  6819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  6820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  6823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  6824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  6825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  6826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  6829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  6831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  6832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  6835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  6836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  6837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  6838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  6841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  6842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  6843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  6844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  6845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  6846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  6847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  6848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  6849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  6850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  6851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  6852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  6853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  6855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  6856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  6857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  6858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  6859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  6860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  6862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  6864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  6865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  6866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  6867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  6868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  6869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  6870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  6873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  6874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  6877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  6878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  6879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  6880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  6881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  6882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  6885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  6886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  6889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  6891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  6893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  6894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  6897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  6898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  6899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  6900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  6903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  6905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  6906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  6907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  6909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  6910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  6911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  6913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  6914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  6915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  6916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  6917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  6918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  6919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  6920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  6921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  6922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  6923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  6924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  6925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  6926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  6927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  6929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  6930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  6931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  6932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  6933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  6934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  6935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  6936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  6937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  6938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  6939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  6940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  6941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  6942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  6944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  6945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  6946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  6947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  6948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  6949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  6950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  6953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  6954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  6955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  6956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  6957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  6958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  6959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  6960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  6961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  6962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  6963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  6964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  6965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  6966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  6967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  6968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  6969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  6970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  6971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  6972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  6973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  6974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  6975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  6977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  6978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  6979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  6980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  6982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  6983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  6984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  6985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  6987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  6988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  6989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  6991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  6992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  6993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  6995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  6996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  6997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  6998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  6999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  7000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  7003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  7004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  7007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  7011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  7012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  7015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  7019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  7020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  7023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  7027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  7028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  7031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  7035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  7036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  7039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  7040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  7043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  7044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  7045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  7049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  7050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  7051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  7060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  7061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  7065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  7072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  7073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  7077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  7078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  7079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  7083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  7084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  7085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  7086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  7087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  7088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  7089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  7090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  7091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  7092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  7093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  7094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  7098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  7099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  7100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  7101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  7107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  7108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  7109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  7110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  7111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  7115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  7118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  7119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  7120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  7121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  7127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  7130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  7134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  7135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  7139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  7146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  7147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  7151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  7154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  7155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  7156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  7157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  7158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  7159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  7163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  7164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  7165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  7166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  7167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  7170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  7171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  7172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  7173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  7174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  7175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  7176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  7177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  7178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  7179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  7180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  7181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  7182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  7183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  7185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  7186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  7187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  7188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  7189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  7190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  7191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  7194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  7196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  7197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  7198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  7199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  7202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  7204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  7205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  7206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  7207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  7208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  7209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  7210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  7211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  7212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  7213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  7214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  7215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  7216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  7218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  7219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  7220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  7221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  7223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  7224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  7225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  7226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  7228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  7229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  7230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  7232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  7233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  7236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  7237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  7238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  7240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  7241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  7244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  7245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  7248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  7252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  7253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  7256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  7260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  7261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  7264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  7268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  7269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  7272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  7276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  7277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  7280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  7281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  7284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  7285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  7286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7287. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7288. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7289. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  7290. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  7291. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  7292. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  7301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  7302. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7303. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7304. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7305. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  7306. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7307. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7308. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7309. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7310. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7311. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7312. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  7313. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  7314. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7315. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7316. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7317. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  7318. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  7319. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  7320. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7321. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7322. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7323. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  7324. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  7325. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  7326. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  7327. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  7328. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  7329. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  7330. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  7331. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  7332. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  7333. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  7334. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  7335. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7336. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7337. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7338. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  7339. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  7340. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  7341. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  7342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7346. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7347. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  7348. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  7349. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  7350. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  7351. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  7352. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7353. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7354. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7355. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  7356. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7357. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7358. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  7359. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  7360. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  7361. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  7362. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7363. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7364. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7365. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7366. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7367. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  7368. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7369. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7370. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  7371. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7372. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7373. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7374. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  7375. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  7376. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7377. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7378. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7379. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  7380. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7381. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7382. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7383. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7384. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7385. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7386. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  7387. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  7388. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7389. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7390. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7391. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  7392. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7393. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7394. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  7395. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  7396. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  7397. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  7398. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  7399. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  7400. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7401. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7402. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7403. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  7404. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  7405. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  7406. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  7407. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  7408. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7409. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7410. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  7411. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  7412. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  7413. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  7414. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  7415. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  7416. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  7417. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  7418. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  7419. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  7420. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  7421. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  7422. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  7423. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  7424. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7425. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  7426. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  7427. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  7428. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  7429. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  7430. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  7431. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  7432. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7433. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7434. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  7435. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7436. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  7437. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  7438. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  7439. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  7440. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  7441. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7442. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  7443. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7444. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  7445. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  7446. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  7447. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  7448. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  7449. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  7450. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  7451. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  7452. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  7453. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  7454. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  7455. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  7456. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  7457. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7458. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  7459. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  7460. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  7461. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  7462. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7463. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  7464. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  7465. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  7466. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  7467. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7468. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  7469. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  7470. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  7471. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7472. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  7473. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  7474. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7475. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7476. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  7477. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  7478. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  7479. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7480. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  7481. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  7482. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7483. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7484. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  7485. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  7486. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7487. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7488. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  7489. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7490. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7491. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7492. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  7493. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  7494. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  7495. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7496. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  7497. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  7498. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7499. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7500. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  7501. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  7502. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7503. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7504. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  7505. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7506. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7507. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7508. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  7509. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  7510. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  7511. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7512. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  7513. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  7514. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7515. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7516. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  7517. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  7518. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7519. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7520. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  7521. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  7522. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  7523. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7524. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetAttributes.cs" Line="119">'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  7525. </Message>
  7526. </Messages>
  7527. </Member>
  7528. <Member Name="#GetChangeTimeCore(System.Boolean,Alphaleonis.Win32.Filesystem.KernelTransaction,Microsoft.Win32.SafeHandles.SafeFileHandle,System.String,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7529. <Messages>
  7530. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7531. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  7532. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  7533. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  7534. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7535. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7536. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7537. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  7538. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7539. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7540. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7541. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  7542. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  7543. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  7544. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7545. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7546. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7547. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  7548. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7549. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7550. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7551. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  7552. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  7553. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  7554. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7555. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7556. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7557. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  7558. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7559. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7560. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7561. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  7562. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  7563. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  7564. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7565. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7566. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7567. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  7568. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7569. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7570. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7571. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  7572. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  7573. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  7574. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7575. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7576. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7577. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  7578. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7579. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7580. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7581. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  7582. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  7583. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  7584. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  7585. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7586. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  7587. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  7588. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  7589. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  7590. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetChangeTime.cs" Line="158">'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7591. </Message>
  7592. </Messages>
  7593. </Member>
  7594. <Member Name="#GetCompressedSizeCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7595. <Messages>
  7596. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7597. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetCompressedSize.cs" Line="108">'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  7598. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetCompressedSize.cs" Line="108">'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  7599. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetCompressedSize.cs" Line="108">'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  7600. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetCompressedSize.cs" Line="108">'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7601. </Message>
  7602. </Messages>
  7603. </Member>
  7604. <Member Name="#GetEncryptionStatusCore(System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7605. <Messages>
  7606. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7607. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetEncryptionStatus.cs" Line="56">'File.GetEncryptionStatusCore(string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  7608. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetEncryptionStatus.cs" Line="56">'File.GetEncryptionStatusCore(string, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  7609. </Message>
  7610. </Messages>
  7611. </Member>
  7612. <Member Name="#GetFileInfoByHandle(Microsoft.Win32.SafeHandles.SafeFileHandle)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  7613. <Messages>
  7614. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetFileInfoByHandleC.cs" Line="35">'File.GetFileInfoByHandle(SafeFileHandle)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  7616. </Message>
  7617. </Messages>
  7618. </Member>
  7619. <Member Name="#GetSizeCore(Alphaleonis.Win32.Filesystem.KernelTransaction,Microsoft.Win32.SafeHandles.SafeFileHandle,System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7620. <Messages>
  7621. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetSize.cs" Line="97">'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  7623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetSize.cs" Line="97">'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  7624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetSize.cs" Line="97">'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  7625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetSize.cs" Line="97">'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  7626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.GetSize.cs" Line="97">'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7627. </Message>
  7628. </Messages>
  7629. </Member>
  7630. <Member Name="#ImportExportEncryptedFileDirectoryRawCore(System.Boolean,System.Boolean,System.IO.Stream,System.String,Alphaleonis.Win32.Filesystem.PathFormat,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7631. <Messages>
  7632. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  7634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  7635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  7636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  7637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  7638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  7639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  7640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  7641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  7642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  7643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  7644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.EncryptedFileRaw.cs" Line="210">'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  7645. </Message>
  7646. </Messages>
  7647. </Member>
  7648. <Member Name="#IsLockedCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7649. <Messages>
  7650. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.IsLocked.cs" Line="96">'File.IsLockedCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetHRForException(Exception)' which has a LinkDemand. By making this call, 'Marshal.GetHRForException(Exception)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  7652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.IsLocked.cs" Line="96">'File.IsLockedCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetHRForException(Exception)' which has a LinkDemand. By making this call, 'Marshal.GetHRForException(Exception)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  7653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.IsLocked.cs" Line="96">'File.IsLockedCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetHRForException(Exception)' which has a LinkDemand. By making this call, 'Marshal.GetHRForException(Exception)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  7654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.IsLocked.cs" Line="96">'File.IsLockedCore(KernelTransaction, string, PathFormat)' calls into 'Marshal.GetHRForException(Exception)' which has a LinkDemand. By making this call, 'Marshal.GetHRForException(Exception)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7655. </Message>
  7656. </Messages>
  7657. </Member>
  7658. <Member Name="#OpenCore(Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.IO.FileMode,System.Security.AccessControl.FileSystemRights,System.IO.FileShare,Alphaleonis.Win32.Filesystem.ExtendedFileAttributes,System.Nullable`1&lt;System.Int32&gt;,System.Security.AccessControl.FileSecurity,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7659. <Messages>
  7660. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  7662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  7663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  7664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  7665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  7666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  7667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  7668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  7669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  7670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  7671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  7672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  7674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  7675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  7676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  7677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  7678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  7679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  7680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  7682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  7683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  7684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  7685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  7686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  7687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  7688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  7689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  7690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  7691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  7693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  7694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  7695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  7696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  7697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  7698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  7699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  7700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  7701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  7702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  7703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  7704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  7705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  7706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  7707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  7708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  7709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  7710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  7711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  7712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  7713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  7714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  7715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  7716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  7717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  7718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  7719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  7720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  7721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  7722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  7723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  7724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  7725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  7726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  7727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  7728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  7729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  7731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  7732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  7733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  7734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  7735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  7736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  7737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  7738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  7739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  7740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  7741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  7742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  7743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  7744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  7745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  7746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  7747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  7748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  7749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  7750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  7751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  7752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  7753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  7754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  7755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  7756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  7757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  7758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  7759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  7760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  7761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  7762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  7763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  7764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  7766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  7767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  7768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  7769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  7770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  7771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  7772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  7773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  7774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  7775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  7776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  7777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  7778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  7779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  7780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  7781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  7782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  7783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  7784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  7785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  7786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  7787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  7788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  7790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Open.cs" Line="990">'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)' calls into 'SafeHandle.Dispose()' which has a LinkDemand. By making this call, 'SafeHandle.Dispose()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  7791. </Message>
  7792. </Messages>
  7793. </Member>
  7794. <Member Name="#ReplaceCore(System.String,System.String,System.String,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7795. <Messages>
  7796. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Replace.cs" Line="153">'File.ReplaceCore(string, string, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  7798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Replace.cs" Line="153">'File.ReplaceCore(string, string, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  7799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Replace.cs" Line="153">'File.ReplaceCore(string, string, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  7800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Replace.cs" Line="153">'File.ReplaceCore(string, string, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  7801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.Replace.cs" Line="153">'File.ReplaceCore(string, string, string, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  7802. </Message>
  7803. </Messages>
  7804. </Member>
  7805. <Member Name="#SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7806. <Messages>
  7807. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  7809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  7810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  7811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  7812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  7813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  7814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  7815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  7816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  7817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  7818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  7819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  7820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  7821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  7822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  7823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  7824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAccessControl.cs" Line="135">'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  7825. </Message>
  7826. </Messages>
  7827. </Member>
  7828. <Member Name="#SetAttributesCore(System.Boolean,Alphaleonis.Win32.Filesystem.KernelTransaction,System.String,System.IO.FileAttributes,System.Boolean,Alphaleonis.Win32.Filesystem.PathFormat)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  7829. <Messages>
  7830. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  7832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  7833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  7837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  7838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  7839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  7848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  7849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  7853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  7860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  7861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  7865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  7866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  7867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  7871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  7872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  7873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  7874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  7875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  7876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  7877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  7878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  7879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  7880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  7881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  7882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  7886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  7887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  7888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  7889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  7890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  7893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  7894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  7895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  7896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  7897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  7898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  7899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  7903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  7906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  7907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  7908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  7909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  7910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  7911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  7914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  7915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  7918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  7920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  7921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  7922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  7923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  7926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  7927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  7928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  7929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  7932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  7933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  7934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  7935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  7938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  7939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  7940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  7942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  7943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  7944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  7945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  7946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  7947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  7948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  7950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  7951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  7952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  7953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  7954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  7955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  7956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  7957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  7958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  7959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  7960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  7961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  7962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  7963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  7964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  7965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  7966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  7967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  7968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  7969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  7970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  7971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  7972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  7973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  7974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  7975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  7976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  7977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  7978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  7979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  7980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  7981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\File Class" File="File.SetAttributes.cs" Line="132">'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  7982. </Message>
  7983. </Messages>
  7984. </Member>
  7985. </Members>
  7986. </Type>
  7987. <Type Name="FindFileSystemEntryInfo" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  7988. <Members>
  7989. <Member Name="#FindFirstFile(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FIND_DATA&amp;)" Kind="Method" Static="False" Accessibility="Private" ExternallyVisible="False">
  7990. <Messages>
  7991. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  7992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  7993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  7994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  7995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  7996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  7997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  7998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  7999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  8033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  8034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  8035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  8036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  8037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  8038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  8039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  8040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  8041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  8042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  8043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  8047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  8048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  8049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  8050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  8052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  8056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  8057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  8058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  8059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  8060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  8061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  8063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  8104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  8105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  8106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  8107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  8108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  8109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  8110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  8111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  8112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  8113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  8114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  8118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  8119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  8120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  8121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  8123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  8127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  8128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  8129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  8130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  8131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  8132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  8134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  8175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  8176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  8177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  8178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  8179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  8180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  8181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  8182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  8183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  8184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  8185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  8189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  8190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  8191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  8192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  8194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  8196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  8197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  8198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  8199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  8200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  8201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  8202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  8203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="FindFileSystemEntryInfo.cs" Line="131">'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  8205. </Message>
  8206. </Messages>
  8207. </Member>
  8208. </Members>
  8209. </Type>
  8210. <Type Name="KernelTransaction" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  8211. <Members>
  8212. <Member Name="#.ctor(System.Security.AccessControl.ObjectSecurity,System.Int32,System.String)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  8213. <Messages>
  8214. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  8215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="78">'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  8216. </Message>
  8217. </Messages>
  8218. </Member>
  8219. <Member Name="#CheckTransaction()" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  8220. <Messages>
  8221. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  8222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Commit()'</Issue>
  8223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.GetExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Rollback()'</Issue>
  8224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetHRForLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetHRForLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Commit()'</Issue>
  8225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetHRForLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetHRForLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Rollback()'</Issue>
  8226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Commit()'</Issue>
  8227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Rollback()'</Issue>
  8228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.ThrowExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.ThrowExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Commit()'</Issue>
  8229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="KernelTransaction.cs" Line="121">'KernelTransaction.CheckTransaction()' calls into 'Marshal.ThrowExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.ThrowExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.CheckTransaction()'&#xD;&#xA; -&gt;'KernelTransaction.Rollback()'</Issue>
  8230. </Message>
  8231. </Messages>
  8232. </Member>
  8233. </Members>
  8234. </Type>
  8235. <Type Name="NativeMethods" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  8236. <Members>
  8237. <Member Name="#AssocCreate(System.Guid,System.Guid&amp;,Alphaleonis.Win32.Filesystem.NativeMethods+IQueryAssociations&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8238. <Messages>
  8239. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocCreate(Guid, ref Guid, out NativeMethods.IQueryAssociations)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocCreate(Guid, ref Guid, out NativeMethods.IQueryAssociations)'&#xD;&#xA; -&gt;'Shell32Info.Initialize()'&#xD;&#xA; -&gt;'Shell32Info.Refresh()'</Issue>
  8241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocCreate(Guid, ref Guid, out NativeMethods.IQueryAssociations)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocCreate(Guid, ref Guid, out NativeMethods.IQueryAssociations)'&#xD;&#xA; -&gt;'Shell32Info.Initialize()'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  8242. </Message>
  8243. </Messages>
  8244. </Member>
  8245. <Member Name="#AssocQueryString(Alphaleonis.Win32.Filesystem.Shell32+AssociationAttributes,Alphaleonis.Win32.Filesystem.Shell32+AssociationString,System.String,System.String,System.Text.StringBuilder,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8246. <Messages>
  8247. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociation(string)'</Issue>
  8249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileContentType(string)'</Issue>
  8250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileDefaultIcon(string)'</Issue>
  8251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileFriendlyAppName(string)'</Issue>
  8252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileFriendlyDocName(string)'</Issue>
  8253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileOpenWithAppName(string)'</Issue>
  8254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AssocQueryString(Shell32.AssociationAttributes, Shell32.AssociationString, string, string, StringBuilder, out uint)'&#xD;&#xA; -&gt;'Shell32.GetFileAssociationCore(string, Shell32.AssociationAttributes, Shell32.AssociationString)'&#xD;&#xA; -&gt;'Shell32.GetFileVerbCommand(string)'</Issue>
  8255. </Message>
  8256. </Messages>
  8257. </Member>
  8258. <Member Name="#BackupRead(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.UInt32,System.UInt32&amp;,System.Boolean,System.Boolean,System.IntPtr&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8259. <Messages>
  8260. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.BackupRead(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.BackupRead(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)'&#xD;&#xA; -&gt;'BackupFileStream.Read(byte[], int, int, bool)'</Issue>
  8262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.BackupRead(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.BackupRead(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)'&#xD;&#xA; -&gt;'BackupFileStream.ReadStreamInfo()'</Issue>
  8263. </Message>
  8264. </Messages>
  8265. </Member>
  8266. <Member Name="#BackupSeek(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.UInt32,System.UInt32&amp;,System.UInt32&amp;,System.IntPtr&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8267. <Messages>
  8268. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.BackupSeek(SafeFileHandle, uint, uint, out uint, out uint, ref IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.BackupSeek(SafeFileHandle, uint, uint, out uint, out uint, ref IntPtr)'&#xD;&#xA; -&gt;'BackupFileStream.Skip(long)'</Issue>
  8270. </Message>
  8271. </Messages>
  8272. </Member>
  8273. <Member Name="#BackupWrite(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.UInt32,System.UInt32&amp;,System.Boolean,System.Boolean,System.IntPtr&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8274. <Messages>
  8275. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.BackupWrite(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.BackupWrite(SafeFileHandle, SafeGlobalMemoryBufferHandle, uint, out uint, bool, bool, ref IntPtr)'&#xD;&#xA; -&gt;'BackupFileStream.Write(byte[], int, int, bool)'</Issue>
  8277. </Message>
  8278. </Messages>
  8279. </Member>
  8280. <Member Name="#CommitTransaction(System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8281. <Messages>
  8282. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CommitTransaction(SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CommitTransaction(SafeHandle)'&#xD;&#xA; -&gt;'KernelTransaction.Commit()'</Issue>
  8284. </Message>
  8285. </Messages>
  8286. </Member>
  8287. <Member Name="#CopyFileEx(System.String,System.String,Alphaleonis.Win32.Filesystem.NativeMethods+NativeCopyMoveProgressRoutine,System.IntPtr,System.Boolean&amp;,Alphaleonis.Win32.Filesystem.CopyOptions)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8288. <Messages>
  8289. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  8331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  8332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  8336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  8339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  8340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  8341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  8342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  8348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  8351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  8355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  8356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  8360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  8367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  8368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  8372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  8375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  8376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  8377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  8378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  8379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  8380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileEx(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  8384. </Message>
  8385. </Messages>
  8386. </Member>
  8387. <Member Name="#CopyFileTransacted(System.String,System.String,Alphaleonis.Win32.Filesystem.NativeMethods+NativeCopyMoveProgressRoutine,System.IntPtr,System.Boolean&amp;,Alphaleonis.Win32.Filesystem.CopyOptions,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8388. <Messages>
  8389. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  8431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  8432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  8436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  8439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  8440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  8441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  8442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  8448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  8451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  8455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  8456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  8460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  8467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  8468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  8472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  8475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  8476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  8477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  8478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  8479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  8480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CopyFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, out bool, CopyOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  8484. </Message>
  8485. </Messages>
  8486. </Member>
  8487. <Member Name="#CreateDirectory(System.String,Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8488. <Messages>
  8489. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  8531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  8532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  8533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  8534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  8535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  8536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  8537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  8538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  8539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  8540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  8541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  8542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  8544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  8545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  8546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  8547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  8548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  8549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  8550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  8553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  8555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  8556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  8557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  8558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  8561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  8563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  8564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  8565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  8566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  8567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  8568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  8569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  8570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  8571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectory(string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  8572. </Message>
  8573. </Messages>
  8574. </Member>
  8575. <Member Name="#CreateDirectoryEx(System.String,System.String,Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8576. <Messages>
  8577. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  8619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  8620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  8621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  8622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  8623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  8624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  8625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  8626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  8627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  8628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  8629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  8630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  8632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  8633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  8634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  8635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  8636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  8637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  8638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  8641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  8643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  8644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  8645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  8646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  8649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  8651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  8652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  8653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  8654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  8655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  8656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  8657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  8658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  8659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryEx(string, string, NativeMethods.SecurityAttributes)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  8660. </Message>
  8661. </Messages>
  8662. </Member>
  8663. <Member Name="#CreateDirectoryTransacted(System.String,System.String,Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8664. <Messages>
  8665. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  8707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  8708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  8709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  8710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  8711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  8712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  8713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  8714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  8715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  8716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  8717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  8718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  8720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  8721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  8722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  8723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  8724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  8725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  8726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  8729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  8731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  8732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  8733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  8734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  8737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  8739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  8740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  8741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  8742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  8743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  8744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  8745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  8746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  8747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateDirectoryTransacted(string, string, NativeMethods.SecurityAttributes, SafeHandle)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  8748. </Message>
  8749. </Messages>
  8750. </Member>
  8751. <Member Name="#CreateFile(System.String,System.Security.AccessControl.FileSystemRights,System.IO.FileShare,Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes,System.IO.FileMode,Alphaleonis.Win32.Filesystem.ExtendedFileAttributes,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  8752. <Messages>
  8753. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  8754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  8755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  8756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  8757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  8758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  8759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  8760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  8761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  8762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  8763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  8764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  8765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  8766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  8767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  8768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  8769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  8770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  8771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  8773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  8774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  8775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  8776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  8777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  8778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  8779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  8781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  8782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  8783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  8784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  8785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  8786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  8790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  8791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  8792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  8801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  8802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  8806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  8813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  8814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  8818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  8819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  8820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  8824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  8825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  8826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  8827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  8828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  8829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  8830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  8831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  8832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  8833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  8834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  8835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  8836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  8838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  8839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  8840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  8841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  8842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  8843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  8844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  8847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  8848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  8849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  8850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  8851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  8852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  8853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  8855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  8857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  8858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  8859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  8860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  8861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  8862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  8863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  8864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  8865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  8866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  8867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  8868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  8869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  8871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  8872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  8873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  8875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  8876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  8877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  8878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  8879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  8881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  8882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  8883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  8885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  8886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  8887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  8888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  8891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  8892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  8895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  8896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  8897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  8898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  8899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  8900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  8903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  8904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  8907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  8909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  8910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  8911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  8912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  8915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  8916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  8917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  8918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  8921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  8922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  8923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  8924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  8925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  8927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  8928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  8929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  8931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  8932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  8933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  8934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  8935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  8936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  8937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  8938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  8939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  8940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  8941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  8942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  8943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  8944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  8945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  8946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  8947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  8948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  8949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  8950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  8951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  8952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  8953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  8954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  8956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  8957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  8958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  8959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  8960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  8961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  8962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  8963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  8964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  8965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  8966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  8967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  8968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  8969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  8970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  8971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  8972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  8973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  8974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  8975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  8976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  8977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  8978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  8979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  8980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  8981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  8983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  8984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  8985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  8986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  8988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  8989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  8990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  8991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  8993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  8994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  8995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  8996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  8997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  8998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  8999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  9000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  9002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  9003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  9004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  9005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  9007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  9008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  9009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  9011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  9012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  9014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  9015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  9016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  9017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  9019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  9020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  9021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  9022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  9023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  9024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  9025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  9027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  9028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  9029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  9030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  9031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  9032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  9033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  9034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  9035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  9036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  9038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  9039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  9040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  9041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  9042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  9043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  9044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  9046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  9047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  9048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  9049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  9050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  9051. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  9052. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  9053. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  9054. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  9055. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  9056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  9057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  9058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  9059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  9061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  9062. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  9063. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  9064. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  9065. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  9066. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  9067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  9068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  9069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  9070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  9071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  9072. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  9073. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  9074. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  9076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  9077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  9078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  9079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  9080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  9081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  9082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  9083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  9084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  9085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  9086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  9087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  9088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  9089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  9091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  9092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  9094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  9095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  9099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  9103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  9104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  9105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  9106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  9107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  9108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  9109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9110. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  9111. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9112. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9113. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9114. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  9115. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  9116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  9117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  9118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  9119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  9123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  9124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  9125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  9126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  9127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  9128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  9129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  9130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  9131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  9132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  9133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  9135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  9136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  9137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  9138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  9139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  9143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  9144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  9149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  9150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  9151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  9155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  9156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  9161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  9162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  9163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  9167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  9168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  9173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  9179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  9185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  9186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  9187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  9191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  9192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9196. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  9197. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  9198. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  9199. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9200. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9201. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9202. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  9203. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  9204. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9205. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  9209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  9210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  9211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  9215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  9216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  9221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9224. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9225. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9226. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  9227. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9228. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9229. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  9233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  9234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  9235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9236. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  9237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  9238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  9239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  9241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  9242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFile(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  9243. </Message>
  9244. </Messages>
  9245. </Member>
  9246. <Member Name="#CreateFileMapping(Microsoft.Win32.SafeHandles.SafeFileHandle,System.Runtime.InteropServices.SafeHandle,System.UInt32,System.UInt32,System.UInt32,System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9247. <Messages>
  9248. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileMapping(SafeFileHandle, SafeHandle, uint, uint, uint, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileMapping(SafeFileHandle, SafeHandle, uint, uint, uint, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  9250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileMapping(SafeFileHandle, SafeHandle, uint, uint, uint, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileMapping(SafeFileHandle, SafeHandle, uint, uint, uint, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  9251. </Message>
  9252. </Messages>
  9253. </Member>
  9254. <Member Name="#CreateFileTransacted(System.String,System.Security.AccessControl.FileSystemRights,System.IO.FileShare,Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes,System.IO.FileMode,Alphaleonis.Win32.Filesystem.ExtendedFileAttributes,System.IntPtr,System.Runtime.InteropServices.SafeHandle,System.IntPtr,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9255. <Messages>
  9256. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  9258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  9259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  9260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  9261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  9262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  9263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  9264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  9265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  9266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  9267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  9268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  9269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  9270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  9271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  9272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  9273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  9274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  9276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  9277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  9278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  9279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  9280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  9281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  9282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  9284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  9285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  9286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  9287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  9288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  9289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  9292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  9293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  9294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  9295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  9296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  9297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  9300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  9302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  9303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  9304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  9305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  9308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  9309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  9310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  9311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  9314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  9316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  9317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  9320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  9321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  9322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  9323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  9326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  9327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  9328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  9329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  9330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  9331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  9332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  9333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  9334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  9335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  9336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  9337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  9338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  9339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  9340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  9341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  9342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  9343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  9344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  9345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  9346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  9347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  9348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  9350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  9352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  9353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  9354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  9355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  9356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  9358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  9359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  9360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  9361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  9362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  9363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  9364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  9365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  9366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  9367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  9368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  9369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  9370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  9371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  9372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  9374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  9375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  9376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  9378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  9379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  9380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  9381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  9382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  9384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  9385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  9386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  9388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  9389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  9390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  9391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  9394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  9395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  9396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  9398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  9399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  9400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  9401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  9402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  9403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  9406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  9407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  9408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  9410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  9412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  9413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  9414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  9415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  9418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  9419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  9420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  9421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  9424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  9426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  9427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  9430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  9431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  9432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  9434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  9435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  9436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  9437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  9438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  9439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  9442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  9443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  9444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  9445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  9446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  9447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  9448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  9450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  9451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  9452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  9453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  9454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  9455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  9456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  9457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  9459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  9460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  9461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  9463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  9464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  9465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  9466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  9467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  9468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  9469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  9470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  9471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  9472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  9473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  9474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  9475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  9476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  9477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  9478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  9479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  9480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  9481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  9482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  9483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  9484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  9486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  9487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  9488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  9489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  9491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  9492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  9493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  9494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  9496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  9497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  9498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  9499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  9501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  9502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  9503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  9505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  9506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  9507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  9508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  9510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  9511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  9512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  9514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  9515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  9517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  9518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  9519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  9520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  9522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  9523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  9524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  9525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  9526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  9527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  9528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  9530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  9531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  9532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  9533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  9534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  9535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  9536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  9537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  9538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  9539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  9541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  9542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  9543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  9544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  9545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  9546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  9547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  9549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  9550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  9551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  9552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  9553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  9554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  9555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  9556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  9557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  9558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  9559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  9560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  9561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  9562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  9564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  9565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  9566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  9567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  9568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  9569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  9570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  9571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  9572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  9573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  9574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  9575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  9576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  9577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  9579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  9580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  9581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  9582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  9583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  9584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  9585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  9586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  9587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  9588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  9589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  9590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  9591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  9592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  9593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  9594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  9595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  9596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  9597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  9598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  9602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  9606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  9607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  9608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  9609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  9610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  9611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  9612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  9614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  9618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  9619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  9620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  9621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  9622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  9623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  9624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  9625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  9626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  9627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  9628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  9629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  9630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  9631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  9632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  9633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  9634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  9635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  9636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  9638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  9639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  9640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  9641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  9642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  9646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  9647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  9652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  9653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  9654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  9658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  9659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  9664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  9665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  9666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  9670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  9671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  9676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  9682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  9688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  9689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  9690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  9694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  9695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  9700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  9701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  9702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  9706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  9707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  9712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  9713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  9714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  9715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  9718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  9719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  9720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  9721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  9722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  9723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  9724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  9730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  9733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  9734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  9735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  9736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  9737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  9738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  9740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  9741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  9742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  9744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  9745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateFileTransacted(string, FileSystemRights, FileShare, NativeMethods.SecurityAttributes, FileMode, ExtendedFileAttributes, IntPtr, SafeHandle, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  9746. </Message>
  9747. </Messages>
  9748. </Member>
  9749. <Member Name="#CreateHardLink(System.String,System.String,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9750. <Messages>
  9751. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLink(string, string, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLink(string, string, IntPtr)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  9753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLink(string, string, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLink(string, string, IntPtr)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  9754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLink(string, string, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLink(string, string, IntPtr)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  9755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLink(string, string, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLink(string, string, IntPtr)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9756. </Message>
  9757. </Messages>
  9758. </Member>
  9759. <Member Name="#CreateHardLinkTransacted(System.String,System.String,System.IntPtr,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9760. <Messages>
  9761. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  9763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  9764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  9765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateHardLinkTransacted(string, string, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9766. </Message>
  9767. </Messages>
  9768. </Member>
  9769. <Member Name="#CreateSymbolicLink(System.String,System.String,Alphaleonis.Win32.Filesystem.SymbolicLinkTarget)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9770. <Messages>
  9771. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  9773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  9774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  9775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLink(string, string, SymbolicLinkTarget)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  9776. </Message>
  9777. </Messages>
  9778. </Member>
  9779. <Member Name="#CreateSymbolicLinkTransacted(System.String,System.String,Alphaleonis.Win32.Filesystem.SymbolicLinkTarget,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9780. <Messages>
  9781. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  9783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  9784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  9785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateSymbolicLinkTransacted(string, string, SymbolicLinkTarget, SafeHandle)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  9786. </Message>
  9787. </Messages>
  9788. </Member>
  9789. <Member Name="#CreateTransaction(Alphaleonis.Win32.Security.NativeMethods+SecurityAttributes,System.IntPtr,System.UInt32,System.UInt32,System.UInt32,System.Int32,System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9790. <Messages>
  9791. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.CreateTransaction(NativeMethods.SecurityAttributes, IntPtr, uint, uint, uint, int, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.CreateTransaction(NativeMethods.SecurityAttributes, IntPtr, uint, uint, uint, int, string)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  9793. </Message>
  9794. </Messages>
  9795. </Member>
  9796. <Member Name="#DecryptFile(System.String,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9797. <Messages>
  9798. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  9800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  9801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  9802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  9803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  9804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  9805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  9806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  9807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  9808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  9809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  9810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  9811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  9812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  9813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  9814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  9815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  9816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DecryptFile(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DecryptFile(string, uint)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  9817. </Message>
  9818. </Messages>
  9819. </Member>
  9820. <Member Name="#DefineDosDevice(Alphaleonis.Win32.Filesystem.DosDeviceAttributes,System.String,System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9821. <Messages>
  9822. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string)'</Issue>
  9824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string, DosDeviceAttributes)'</Issue>
  9825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string)'</Issue>
  9826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string)'</Issue>
  9827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, DosDeviceAttributes, bool)'</Issue>
  9828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DefineDosDevice(DosDeviceAttributes, string, string)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, bool)'</Issue>
  9829. </Message>
  9830. </Messages>
  9831. </Member>
  9832. <Member Name="#DeleteFile(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9833. <Messages>
  9834. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  9836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  9837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  9840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  9841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  9842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  9843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  9844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  9845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  9848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  9850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  9851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  9852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  9853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  9856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  9857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  9858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  9859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  9862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  9864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  9865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  9868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  9869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  9870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  9871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  9874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  9875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  9876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  9877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  9878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  9879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  9880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  9881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  9882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  9883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  9884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  9885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  9886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  9888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  9889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  9890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  9891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  9892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  9893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  9895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  9897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  9898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  9899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  9900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  9901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  9902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  9903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  9904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  9905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  9906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  9908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFile(string)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  9909. </Message>
  9910. </Messages>
  9911. </Member>
  9912. <Member Name="#DeleteFileTransacted(System.String,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9913. <Messages>
  9914. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  9916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  9917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  9920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  9921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  9922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  9923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  9924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  9925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  9928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  9930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  9931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  9932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  9933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  9936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  9937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  9938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  9939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  9942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  9943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  9944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  9945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  9948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  9949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  9950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  9951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  9952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  9954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  9955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  9956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  9957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  9958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  9959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  9960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  9961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  9962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  9963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  9964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  9965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  9966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  9968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  9969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  9970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  9971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  9972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  9973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  9974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  9975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  9977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  9978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  9979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  9980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  9981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  9982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  9983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  9984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  9985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  9986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  9987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  9988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteFileTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteFileTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  9989. </Message>
  9990. </Messages>
  9991. </Member>
  9992. <Member Name="#DeleteVolumeMountPoint(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  9993. <Messages>
  9994. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  9995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  9996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  9997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  9998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  9999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  10001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  10002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  10003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  10012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  10013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  10017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  10024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  10025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  10029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  10030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  10031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  10035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  10036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  10037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  10038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  10039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  10040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  10041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  10042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  10043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  10044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  10045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  10046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  10050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  10051. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  10052. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  10053. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10054. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10055. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  10059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  10060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  10061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeleteVolumeMountPoint(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeleteVolumeMountPoint(string)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPoint(string)'</Issue>
  10062. </Message>
  10063. </Messages>
  10064. </Member>
  10065. <Member Name="#DeviceIoControl(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.IntPtr,System.UInt32,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.UInt32,System.UInt32&amp;,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10066. <Messages>
  10067. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  10069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  10070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  10071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, IntPtr, uint, SafeGlobalMemoryBufferHandle, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.GetLinkTargetInfoCore(SafeFileHandle)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10072. </Message>
  10073. </Messages>
  10074. </Member>
  10075. <Member Name="#DeviceIoControl(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.Object,System.UInt32,System.Object,System.UInt32,System.UInt32&amp;,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10076. <Messages>
  10077. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  10079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  10080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  10081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  10082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  10083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  10084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  10085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  10087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  10088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  10089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  10090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  10091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  10092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  10093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  10095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  10096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  10097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  10098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  10099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  10100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  10104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  10105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  10106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10110. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10111. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10112. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10113. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10114. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  10115. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  10116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  10120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  10127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  10128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  10132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  10133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  10134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  10138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  10139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  10140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  10141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  10142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  10143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  10144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  10145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  10146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  10147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  10148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  10149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  10150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  10152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  10153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  10154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  10155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  10156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  10157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  10158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  10161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  10163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  10164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  10165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  10166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  10169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  10171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  10172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  10173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  10174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  10175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  10176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  10177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  10178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  10179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  10180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  10181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  10182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  10183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  10185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  10186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  10187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  10189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  10190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  10191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  10192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  10193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  10195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  10196. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  10197. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10198. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  10199. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.DeviceIoControl(SafeFileHandle, uint, object, uint, object, uint, out uint, IntPtr)'&#xD;&#xA; -&gt;'Device.InvokeIoControlUnknownSize&lt;TV&gt;(SafeFileHandle, uint, TV, uint)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  10200. </Message>
  10201. </Messages>
  10202. </Member>
  10203. <Member Name="#EncryptFile(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10204. <Messages>
  10205. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  10207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  10208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  10209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  10210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  10211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  10212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  10213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  10214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  10215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  10216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  10217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  10218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  10219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  10220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  10221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  10222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  10223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptFile(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptFile(string)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  10224. </Message>
  10225. </Messages>
  10226. </Member>
  10227. <Member Name="#EncryptionDisable(System.String,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10228. <Messages>
  10229. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  10231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  10232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  10233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  10234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  10235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.EncryptionDisable(string, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.EncryptionDisable(string, bool)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  10236. </Message>
  10237. </Messages>
  10238. </Member>
  10239. <Member Name="#FileEncryptionStatus(System.String,Alphaleonis.Win32.Filesystem.FileEncryptionStatus&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10240. <Messages>
  10241. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FileEncryptionStatus(string, out FileEncryptionStatus)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FileEncryptionStatus(string, out FileEncryptionStatus)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  10243. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FileEncryptionStatus(string, out FileEncryptionStatus)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FileEncryptionStatus(string, out FileEncryptionStatus)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  10244. </Message>
  10245. </Messages>
  10246. </Member>
  10247. <Member Name="#FindFirstFileEx(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+FINDEX_INFO_LEVELS,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FIND_DATA&amp;,Alphaleonis.Win32.Filesystem.NativeMethods+FINDEX_SEARCH_OPS,System.IntPtr,Alphaleonis.Win32.Filesystem.NativeMethods+FindExAdditionalFlags)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10248. <Messages>
  10249. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  10251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  10252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  10256. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  10257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  10258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  10267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  10268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  10272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  10279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  10280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  10284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  10285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  10286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  10290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  10291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  10292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  10293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  10294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  10295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  10296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  10297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  10298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  10299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  10300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  10301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  10305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  10306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  10307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  10308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  10314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  10315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  10316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  10317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  10318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  10322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  10325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  10326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  10327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  10328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  10334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  10337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  10341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  10342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  10346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  10353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  10354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  10358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  10361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  10362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  10363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  10364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  10365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  10366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  10370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  10371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  10372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  10373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  10374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  10377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  10378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  10379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  10380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  10381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  10382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  10383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  10384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  10385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  10386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  10387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  10388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  10389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  10390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  10392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  10393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  10394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  10395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  10396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  10397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  10398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  10401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  10403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  10404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  10405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  10406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  10409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  10411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  10412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  10413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  10414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  10415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  10416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  10417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  10418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  10419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  10420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  10421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  10422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  10423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  10425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  10426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  10427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  10428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  10430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  10431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  10432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  10433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  10435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  10436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  10437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  10439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  10440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  10443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  10444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  10445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  10447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  10448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  10451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  10452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  10453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  10455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  10456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  10459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  10460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  10461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  10463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  10464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  10467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  10468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  10469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  10471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  10472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  10475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  10476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  10477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  10479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  10480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  10483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  10484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  10485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  10487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  10488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  10489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  10491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  10492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  10493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  10494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileEx(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  10496. </Message>
  10497. </Messages>
  10498. </Member>
  10499. <Member Name="#FindFirstFileTransacted(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+FINDEX_INFO_LEVELS,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FIND_DATA&amp;,Alphaleonis.Win32.Filesystem.NativeMethods+FINDEX_SEARCH_OPS,System.IntPtr,Alphaleonis.Win32.Filesystem.NativeMethods+FindExAdditionalFlags,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10500. <Messages>
  10501. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  10503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  10504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  10508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  10509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  10510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  10519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  10520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  10524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  10531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  10532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  10536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  10537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  10538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  10542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  10543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  10544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  10545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  10546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  10547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  10548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  10549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  10550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  10551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  10552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  10553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  10557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  10558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  10559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  10560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  10566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  10567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  10568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  10569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  10570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  10574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  10577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  10578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  10579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  10580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  10586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  10589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  10593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  10594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  10598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  10605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  10606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  10610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  10613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  10614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  10615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  10616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  10617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  10618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  10622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  10623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  10624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  10625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  10626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  10629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  10630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  10631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  10632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  10633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  10634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  10635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  10636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  10637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  10638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  10639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  10640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  10641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  10642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  10644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  10645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  10646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  10647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  10648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  10649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  10650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  10653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  10655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  10656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  10657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  10658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  10661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  10663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  10664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  10665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  10666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  10667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  10668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  10669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  10670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  10671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  10672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  10673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  10674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  10675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  10677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  10678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  10679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  10680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  10682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  10683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  10684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  10685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  10687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  10688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  10689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  10691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  10692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  10695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  10696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  10697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  10699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  10700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  10703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  10704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  10705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  10707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  10708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  10711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  10712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  10713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  10715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  10716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  10719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  10720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  10721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  10723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  10724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  10727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  10728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  10729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  10731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  10732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  10733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  10735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  10736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  10737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  10739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  10740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  10741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  10743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  10744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  10745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  10746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FindFirstFileTransacted(string, NativeMethods.FINDEX_INFO_LEVELS, out NativeMethods.WIN32_FIND_DATA, NativeMethods.FINDEX_SEARCH_OPS, IntPtr, NativeMethods.FindExAdditionalFlags, SafeHandle)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFirstFile(string, out NativeMethods.WIN32_FIND_DATA)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  10748. </Message>
  10749. </Messages>
  10750. </Member>
  10751. <Member Name="#FlushFileBuffers(Microsoft.Win32.SafeHandles.SafeFileHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10752. <Messages>
  10753. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.FlushFileBuffers(SafeFileHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.FlushFileBuffers(SafeFileHandle)'&#xD;&#xA; -&gt;'BackupFileStream.Flush()'</Issue>
  10755. </Message>
  10756. </Messages>
  10757. </Member>
  10758. <Member Name="#GetCompressedFileSize(System.String,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10759. <Messages>
  10760. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSize(string, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSize(string, out uint)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  10762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSize(string, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSize(string, out uint)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  10763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSize(string, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSize(string, out uint)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  10764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSize(string, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSize(string, out uint)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10765. </Message>
  10766. </Messages>
  10767. </Member>
  10768. <Member Name="#GetCompressedFileSizeTransacted(System.String,System.UInt32&amp;,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10769. <Messages>
  10770. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  10772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  10773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  10774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCompressedFileSizeTransacted(string, out uint, SafeHandle)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10775. </Message>
  10776. </Messages>
  10777. </Member>
  10778. <Member Name="#GetCurrentDirectory(System.UInt32,System.Text.StringBuilder)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10779. <Messages>
  10780. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetCurrentDirectory(uint, StringBuilder)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetCurrentDirectory(uint, StringBuilder)'&#xD;&#xA; -&gt;'Directory.GetCurrentDirectory()'</Issue>
  10782. </Message>
  10783. </Messages>
  10784. </Member>
  10785. <Member Name="#GetDiskFreeSpace(System.String,System.Int32&amp;,System.Int32&amp;,System.Int32&amp;,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10786. <Messages>
  10787. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetDiskFreeSpace(string, out int, out int, out int, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetDiskFreeSpace(string, out int, out int, out int, out uint)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  10789. </Message>
  10790. </Messages>
  10791. </Member>
  10792. <Member Name="#GetDiskFreeSpaceEx(System.String,System.Int64&amp;,System.Int64&amp;,System.Int64&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10793. <Messages>
  10794. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetDiskFreeSpaceEx(string, out long, out long, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetDiskFreeSpaceEx(string, out long, out long, out long)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  10796. </Message>
  10797. </Messages>
  10798. </Member>
  10799. <Member Name="#GetDriveType(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10800. <Messages>
  10801. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetDriveType(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetDriveType(string)'&#xD;&#xA; -&gt;'Volume.GetDriveType(string)'</Issue>
  10803. </Message>
  10804. </Messages>
  10805. </Member>
  10806. <Member Name="#GetFileAttributesEx(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+GetFileExInfoLevels,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FILE_ATTRIBUTE_DATA&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  10807. <Messages>
  10808. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  10809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  10810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  10811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  10815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  10816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  10817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  10826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  10827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  10831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  10838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  10839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  10843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  10844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  10845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  10849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  10850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  10851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  10852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  10853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  10854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  10855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  10856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  10857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  10858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  10859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  10860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  10864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  10865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  10866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  10867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  10871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  10872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  10873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  10874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  10875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  10876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  10877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  10880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  10881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  10884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  10885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  10886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  10887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  10888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  10889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  10892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  10893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  10896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  10898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  10900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  10901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  10904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  10905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  10906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  10907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  10910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  10912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  10913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  10914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  10916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  10917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  10918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  10920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  10921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  10922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  10923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  10924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  10925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  10926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  10927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  10928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  10929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  10930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  10931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  10932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  10933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  10934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  10936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  10937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  10938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  10939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  10940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  10941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  10942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  10943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  10944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  10945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  10946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  10947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  10948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  10949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  10951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  10952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  10953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  10954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  10955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  10956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  10957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  10960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  10961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  10962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  10963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  10964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  10965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  10966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  10967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  10968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  10969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  10970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  10971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  10972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  10973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  10974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  10975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  10976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  10977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  10978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  10979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  10980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  10981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  10982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  10984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  10985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  10986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  10987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  10989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  10990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  10991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  10992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  10994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  10995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  10996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  10997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  10998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  10999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  11002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  11003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  11004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  11006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  11007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  11010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  11011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  11014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  11018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  11019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  11022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  11026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  11027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  11030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  11034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  11035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  11038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  11042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  11043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  11046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  11047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesEx(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  11050. </Message>
  11051. </Messages>
  11052. </Member>
  11053. <Member Name="#GetFileAttributesTransacted(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+GetFileExInfoLevels,Alphaleonis.Win32.Filesystem.NativeMethods+WIN32_FILE_ATTRIBUTE_DATA&amp;,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11054. <Messages>
  11055. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  11057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  11058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  11061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  11062. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  11063. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  11064. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  11065. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  11066. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  11069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  11071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11072. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  11073. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  11074. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  11077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  11078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  11079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  11080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  11083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  11085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  11086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  11089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  11090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  11091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  11092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  11095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  11096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  11097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  11098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  11099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  11100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  11101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  11102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  11103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  11104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  11105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  11106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  11107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  11109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  11110. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  11111. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  11112. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  11113. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  11114. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11115. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  11116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  11118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  11119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  11120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  11121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  11122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  11123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  11124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  11127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  11128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  11131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  11132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  11133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  11134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  11135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  11136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  11139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  11140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  11143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  11145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  11147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  11148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  11151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  11152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  11153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  11154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  11157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  11159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  11160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  11163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  11164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  11167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  11168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  11169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  11170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  11171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  11172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  11175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  11176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  11177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  11178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  11179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  11180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  11181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  11183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  11184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  11185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  11186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  11187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  11188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  11189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  11190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  11191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  11192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  11193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  11194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  11195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  11196. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11197. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  11198. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  11199. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  11200. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  11201. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  11202. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  11203. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  11204. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11205. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  11207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  11209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  11210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  11211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  11212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  11215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  11217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  11218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  11219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  11220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  11221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  11222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  11223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  11224. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  11225. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  11226. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  11227. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  11228. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  11229. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  11231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  11232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  11233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  11234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  11236. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  11237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  11238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  11239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  11241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  11242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  11243. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11244. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  11245. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  11246. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11247. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  11249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  11250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  11251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  11253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  11254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11256. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  11257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  11258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  11261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  11265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  11266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  11269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  11273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  11274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  11277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  11281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  11282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  11285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  11289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  11290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  11293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  11294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileAttributesTransacted(string, NativeMethods.GetFileExInfoLevels, out NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, SafeHandle)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  11297. </Message>
  11298. </Messages>
  11299. </Member>
  11300. <Member Name="#GetFileInformationByHandle(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.Filesystem.NativeMethods+BY_HANDLE_FILE_INFORMATION&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11301. <Messages>
  11302. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandle(SafeFileHandle, out NativeMethods.BY_HANDLE_FILE_INFORMATION)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandle(SafeFileHandle, out NativeMethods.BY_HANDLE_FILE_INFORMATION)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  11304. </Message>
  11305. </Messages>
  11306. </Member>
  11307. <Member Name="#GetFileInformationByHandleEx_FileBasicInfo(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.Filesystem.NativeMethods+FileInfoByHandleClass,Alphaleonis.Win32.Filesystem.NativeMethods+FILE_BASIC_INFO&amp;,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11308. <Messages>
  11309. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  11311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  11312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  11313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  11314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  11316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  11317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  11318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  11321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  11322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  11323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  11324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  11326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  11327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  11328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileInformationByHandleEx_FileBasicInfo(SafeFileHandle, NativeMethods.FileInfoByHandleClass, out NativeMethods.FILE_BASIC_INFO, uint)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11330. </Message>
  11331. </Messages>
  11332. </Member>
  11333. <Member Name="#GetFileSizeEx(Microsoft.Win32.SafeHandles.SafeFileHandle,System.Int64&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11334. <Messages>
  11335. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  11337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  11338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  11339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  11340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  11342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFileSizeEx(SafeFileHandle, out long)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  11343. </Message>
  11344. </Messages>
  11345. </Member>
  11346. <Member Name="#GetFinalPathNameByHandle(Microsoft.Win32.SafeHandles.SafeFileHandle,System.Text.StringBuilder,System.UInt32,Alphaleonis.Win32.Filesystem.FinalPathFormats)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11347. <Messages>
  11348. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFinalPathNameByHandle(SafeFileHandle, StringBuilder, uint, FinalPathFormats)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFinalPathNameByHandle(SafeFileHandle, StringBuilder, uint, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  11350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFinalPathNameByHandle(SafeFileHandle, StringBuilder, uint, FinalPathFormats)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFinalPathNameByHandle(SafeFileHandle, StringBuilder, uint, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  11351. </Message>
  11352. </Messages>
  11353. </Member>
  11354. <Member Name="#GetFullPathName(System.String,System.UInt32,System.Text.StringBuilder,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  11355. <Messages>
  11356. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  11357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  11358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  11359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  11361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  11362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  11363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  11366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  11367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  11369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  11370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  11371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  11374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  11375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  11376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  11377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  11378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  11379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  11382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  11383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  11384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  11385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  11386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  11387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  11390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  11392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  11394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  11395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  11398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  11399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  11400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  11401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  11404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  11406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  11407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  11410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  11411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  11412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  11413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  11416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  11417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  11418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  11419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  11420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  11421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  11422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  11423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  11424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  11425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  11426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  11427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  11428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  11429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  11431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  11432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  11433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  11434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  11435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  11436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  11437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  11440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  11442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  11443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  11444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  11445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  11446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  11448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  11450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  11451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  11452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  11453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  11454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  11455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  11456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  11457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  11458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  11459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  11460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  11461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  11462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  11463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  11464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  11465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  11466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  11467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  11468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  11469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  11470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  11472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  11473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  11474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  11475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  11476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  11477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  11479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  11481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  11482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  11483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  11484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  11485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  11486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  11487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  11488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  11489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  11490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  11491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  11492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  11493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  11494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  11495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  11496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  11497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  11498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  11499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  11500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  11501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  11502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  11503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  11504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  11505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  11506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  11508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  11509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  11510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  11512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  11513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  11514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  11515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  11516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  11517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  11518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  11519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  11520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  11522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  11523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  11524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  11525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  11527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  11528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  11529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  11532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  11533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  11536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  11537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  11538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  11539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  11540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  11541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  11544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  11545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  11548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  11550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  11551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  11552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  11553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  11556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  11557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  11558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  11559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  11562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  11564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  11565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  11566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  11568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  11569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  11570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  11572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  11573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  11574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  11575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  11576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  11577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  11578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  11579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  11580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  11581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  11582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  11583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  11584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  11585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  11586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  11587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  11588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  11589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  11590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  11591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  11592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  11593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  11594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  11596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  11597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  11598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  11600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  11601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  11602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  11603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  11604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  11606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  11607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  11608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  11610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  11611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  11612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  11613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  11614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  11615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  11616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  11617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  11618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  11619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  11620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  11621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  11622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  11623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  11624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  11625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  11627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  11628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  11629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  11630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  11631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  11632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  11633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  11634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  11635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  11636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  11637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  11638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  11639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  11640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  11641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  11642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  11643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  11644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  11645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  11646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  11647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  11648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  11649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  11650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  11651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  11652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  11654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  11655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  11656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  11659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  11660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  11661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  11662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  11664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  11665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  11666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  11669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  11670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  11671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  11673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  11674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  11675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  11676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  11678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  11679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  11680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  11681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  11682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  11683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  11684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  11685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  11686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  11687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  11688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  11690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  11691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  11692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  11693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  11694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  11695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  11696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  11698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  11699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  11700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  11701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  11702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  11703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  11704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  11705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  11706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  11707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  11709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  11710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  11711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  11712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  11713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  11714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  11715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  11716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  11717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  11718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  11719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  11720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  11721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  11722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  11723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  11724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  11725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  11726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  11727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  11728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  11729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  11730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  11731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  11732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  11733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  11734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  11735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  11736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  11737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  11738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  11739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  11740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  11741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  11742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  11743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  11744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  11745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  11747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  11748. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  11749. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  11750. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  11751. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  11752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  11753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  11754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  11755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  11756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  11757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  11758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  11759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  11760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  11761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  11762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  11763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  11764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  11765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  11766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  11767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  11768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  11769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  11770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  11771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  11772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  11773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  11774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  11775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  11776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  11777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  11778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  11779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  11780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  11782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  11783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  11784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  11785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  11786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  11787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  11788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  11789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  11790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  11791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  11792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  11793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  11794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  11795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  11796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  11797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  11798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  11799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  11800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  11801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  11802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  11803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  11804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  11806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  11807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  11808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  11809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  11810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  11814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  11815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  11820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  11821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  11822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  11826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  11827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  11832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  11833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  11834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  11838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  11839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  11844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  11847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  11850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  11853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  11856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  11857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  11858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  11862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  11863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  11868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  11869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  11870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  11874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  11875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  11880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  11881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  11882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  11883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  11886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  11887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  11888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  11889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  11890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  11891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  11892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  11895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  11898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  11901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  11902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  11903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  11904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  11905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  11908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  11909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  11910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  11912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  11913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  11914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  11915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  11916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  11917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  11918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  11919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  11920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  11921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  11922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  11923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  11924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  11925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  11926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  11927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  11928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  11929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  11930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  11931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  11932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  11933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  11934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  11935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  11936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  11937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  11938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  11939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  11941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  11942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  11943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  11944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  11946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  11947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  11948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  11949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  11951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  11952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  11953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  11955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  11956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  11959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  11960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  11961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  11963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  11964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  11967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  11968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  11971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  11975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  11976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  11977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  11979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  11980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  11983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  11984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  11987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  11991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  11992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  11993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  11995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  11996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  11997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  11998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  11999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  12000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  12001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  12003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  12004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  12005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  12006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  12007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  12008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  12009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  12010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  12011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  12012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  12013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  12014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  12015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  12016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  12017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  12018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  12019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  12020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  12021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  12022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  12023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  12024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  12025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  12026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  12027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  12028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  12029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  12030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  12031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  12032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  12033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  12034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  12035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  12036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  12037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  12038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  12039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  12040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  12041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  12042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  12043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  12044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  12045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  12046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  12047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  12048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  12050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12051. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12052. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12053. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12054. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12055. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  12056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  12057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  12059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  12060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  12061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12062. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  12063. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  12064. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  12065. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  12066. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  12070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12072. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12073. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12074. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  12076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  12077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  12079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  12080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  12081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  12083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  12084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  12085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  12086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  12090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  12096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  12097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  12099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  12100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  12101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  12103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  12104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  12107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  12108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12110. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  12111. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  12112. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  12113. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12114. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  12115. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  12116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  12117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  12119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  12120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  12121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  12122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  12126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  12132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  12133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  12134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  12135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  12136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  12138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  12139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  12140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  12141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  12142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  12144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  12145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  12146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  12147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  12148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  12150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  12151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  12152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  12153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  12154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  12155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  12156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  12157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  12158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  12159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  12160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  12161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  12162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  12163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  12164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  12165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  12166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  12167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  12168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  12169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  12170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  12171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  12172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  12173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  12174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  12175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  12176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  12177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  12178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  12180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  12181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  12182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  12183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  12184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  12185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  12186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  12187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  12188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  12189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  12190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  12191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  12192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  12193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  12194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  12195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathName(string, uint, StringBuilder, IntPtr)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  12196. </Message>
  12197. </Messages>
  12198. </Member>
  12199. <Member Name="#GetFullPathNameTransacted(System.String,System.UInt32,System.Text.StringBuilder,System.IntPtr,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  12200. <Messages>
  12201. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  12202. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  12203. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  12204. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12205. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  12206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  12207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  12211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  12212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  12214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  12215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  12219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  12220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  12221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  12222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  12223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  12224. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12225. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12226. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  12227. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  12228. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  12229. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  12230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  12231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  12232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  12235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12236. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  12237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  12238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  12239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  12240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  12243. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  12244. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  12245. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  12246. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12247. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  12249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  12251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  12252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  12255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  12256. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  12257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  12258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  12261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  12262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  12263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  12264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  12265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  12266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  12267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  12268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  12269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  12270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  12271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  12272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  12273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  12274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  12275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  12276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  12277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  12278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  12279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  12280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  12281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  12282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  12283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  12285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  12286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  12287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  12288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  12289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  12290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  12291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  12293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  12294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  12295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  12296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  12297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  12298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  12299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  12300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  12301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  12302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  12303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  12304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  12305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  12306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  12307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  12308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  12309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  12310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  12311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  12312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  12313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  12314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  12315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  12316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  12317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  12318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  12319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  12320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  12321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  12322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  12324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  12325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  12326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  12327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  12328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  12329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  12330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  12331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  12332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  12333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  12334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  12335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  12336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  12337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  12338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  12339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  12340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  12341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  12342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  12343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  12344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  12345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  12346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  12347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  12348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  12349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  12350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  12351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  12353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  12354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  12355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  12357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  12358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  12359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  12360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  12361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  12362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  12363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  12364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  12365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  12367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  12368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  12372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  12373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  12374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  12377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  12378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  12379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  12381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  12382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  12383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  12384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  12385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  12386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  12389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  12390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  12391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  12393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  12395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  12396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  12397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  12398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  12401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  12402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  12403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  12404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  12407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  12409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  12410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  12411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  12413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  12414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  12415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  12417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  12418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  12419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  12420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  12421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  12422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  12423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  12424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  12425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  12426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  12427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  12428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  12429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  12430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  12431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  12432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  12433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  12434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  12435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  12436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  12437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  12438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  12439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  12441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  12442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  12443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  12445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  12446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  12447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  12448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  12449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  12451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  12452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  12453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  12455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  12456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  12457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  12458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  12459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  12460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  12461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  12462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  12463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  12464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  12465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  12466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  12467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  12468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  12469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  12470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  12472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  12473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  12474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  12475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  12476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  12477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  12478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  12479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  12480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  12481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  12482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  12483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  12484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  12485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  12486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  12487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  12488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  12489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  12490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  12491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  12492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  12493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  12494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  12495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  12496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  12497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  12499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  12500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  12501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  12504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  12505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  12506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  12507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  12509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  12510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  12511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  12514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  12515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  12516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  12518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  12519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  12520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  12521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  12523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  12524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  12525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  12526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  12527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  12528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  12529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  12530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  12531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  12532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  12533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  12535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  12536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  12537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  12538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  12539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  12540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  12541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  12543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  12544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  12545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  12546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  12547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  12548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  12549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  12550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  12551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  12552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  12554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  12555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  12556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  12557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  12558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  12559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  12560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  12561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  12562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  12563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  12564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  12565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  12566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  12567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  12568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  12569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  12570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  12571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  12572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  12573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  12574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  12575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  12576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  12577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  12578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  12579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  12580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  12581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  12582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  12583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  12584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  12585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  12586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  12587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  12588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  12589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  12590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  12592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  12593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  12594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  12595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  12596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  12597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  12598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  12599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  12600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  12601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  12602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  12603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  12604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  12605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  12606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  12607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  12608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  12609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  12610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  12611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  12612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  12613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  12614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  12615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  12616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  12617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  12618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  12619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  12620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  12621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  12622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  12623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  12624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  12625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  12627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  12628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  12629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  12630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  12631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  12632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  12633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  12634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  12635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  12636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  12637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  12638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  12639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  12640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  12641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  12642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  12643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  12644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  12645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  12646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  12647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  12648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  12649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  12651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  12652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  12653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  12654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  12655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  12659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  12660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  12665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  12666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  12667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  12671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  12672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  12677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  12678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  12679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  12683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  12684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  12689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  12692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  12695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  12698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  12701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  12702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  12703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  12707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  12708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  12713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  12714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  12715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  12719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  12720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  12725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  12726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  12727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  12728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  12731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  12732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  12733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  12734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  12735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  12736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  12737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  12740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  12743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  12746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  12747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  12748. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  12749. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  12750. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  12751. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  12753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  12754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  12755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  12757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  12758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  12759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  12760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  12761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  12762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  12764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  12765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  12766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  12767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  12768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  12769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  12770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  12771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  12772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  12773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  12774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  12775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  12776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  12777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  12778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  12779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  12780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  12781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  12782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  12783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  12784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  12786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  12787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  12788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  12789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  12791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  12792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  12793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  12794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  12796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  12797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  12798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  12800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  12801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  12804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  12805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  12806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  12808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  12809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  12812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  12813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  12814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  12816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  12817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  12820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  12821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  12822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  12824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  12825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  12828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  12829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  12830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  12832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  12833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  12836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  12837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  12838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  12840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  12841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  12842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  12844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  12845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  12846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  12848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  12849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  12850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  12851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  12852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  12853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  12854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  12855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  12856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  12857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  12858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  12859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  12860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  12861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  12862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  12863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  12864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  12865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  12866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  12867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  12868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  12869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  12870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  12871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  12872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  12873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  12874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  12875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  12876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  12877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  12878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  12879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  12880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  12881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  12882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  12883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  12884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  12885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  12886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  12887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  12888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  12889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  12890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  12891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  12892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  12893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  12895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  12901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  12902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  12904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  12905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  12906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  12908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  12909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  12910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  12911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  12915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  12921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  12922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  12924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  12925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  12926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  12928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  12929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  12930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  12931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  12935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  12941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  12942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  12944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  12945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  12946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  12948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  12949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  12952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  12953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  12956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  12957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  12958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  12960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  12961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  12962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  12964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  12965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  12966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  12967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  12968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  12970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  12971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  12972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  12973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  12974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  12976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  12977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  12978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  12979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  12980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  12981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  12983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  12984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  12985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  12986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  12987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  12989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  12990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  12991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  12992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  12993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  12994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  12995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  12996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  12997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  12998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  12999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  13000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  13001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  13002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  13003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  13004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  13005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  13006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  13007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  13008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  13009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  13010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  13011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  13012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  13013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  13014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  13015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  13016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  13017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  13018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  13019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  13020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  13021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  13022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  13023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  13025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  13026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  13027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  13028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  13029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  13030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  13031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  13032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  13033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  13034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  13035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  13036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  13037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  13038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  13039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  13040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetFullPathNameTransacted(string, uint, StringBuilder, IntPtr, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  13041. </Message>
  13042. </Messages>
  13043. </Member>
  13044. <Member Name="#GetLongPathName(System.String,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13045. <Messages>
  13046. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  13048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  13049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  13050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  13051. </Message>
  13052. </Messages>
  13053. </Member>
  13054. <Member Name="#GetLongPathNameTransacted(System.String,System.Text.StringBuilder,System.UInt32,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13055. <Messages>
  13056. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  13058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  13059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  13060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetLongPathNameTransacted(string, StringBuilder, uint, SafeHandle)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  13061. </Message>
  13062. </Messages>
  13063. </Member>
  13064. <Member Name="#GetMappedFileName(System.IntPtr,Alphaleonis.Win32.Security.SafeLocalMemoryBufferHandle,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13065. <Messages>
  13066. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetMappedFileName(IntPtr, SafeLocalMemoryBufferHandle, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetMappedFileName(IntPtr, SafeLocalMemoryBufferHandle, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetMappedFileName(IntPtr, SafeLocalMemoryBufferHandle, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetMappedFileName(IntPtr, SafeLocalMemoryBufferHandle, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13069. </Message>
  13070. </Messages>
  13071. </Member>
  13072. <Member Name="#GetShortPathName(System.String,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13073. <Messages>
  13074. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetShortPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetShortPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  13076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetShortPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetShortPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  13077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetShortPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetShortPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  13078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetShortPathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetShortPathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  13079. </Message>
  13080. </Messages>
  13081. </Member>
  13082. <Member Name="#GetVolumeInformation(System.String,System.Text.StringBuilder,System.UInt32,System.UInt32&amp;,System.Int32&amp;,Alphaleonis.Win32.Filesystem.NativeMethods+VolumeInfoAttributes&amp;,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13083. <Messages>
  13084. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetVolumeInformation(string, StringBuilder, uint, out uint, out int, out NativeMethods.VolumeInfoAttributes, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetVolumeInformation(string, StringBuilder, uint, out uint, out int, out NativeMethods.VolumeInfoAttributes, StringBuilder, uint)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  13086. </Message>
  13087. </Messages>
  13088. </Member>
  13089. <Member Name="#GetVolumeInformationByHandle(Microsoft.Win32.SafeHandles.SafeFileHandle,System.Text.StringBuilder,System.UInt32,System.UInt32&amp;,System.Int32&amp;,Alphaleonis.Win32.Filesystem.NativeMethods+VolumeInfoAttributes&amp;,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13090. <Messages>
  13091. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetVolumeInformationByHandle(SafeFileHandle, StringBuilder, uint, out uint, out int, out NativeMethods.VolumeInfoAttributes, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetVolumeInformationByHandle(SafeFileHandle, StringBuilder, uint, out uint, out int, out NativeMethods.VolumeInfoAttributes, StringBuilder, uint)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  13093. </Message>
  13094. </Messages>
  13095. </Member>
  13096. <Member Name="#GetVolumeNameForVolumeMountPoint(System.String,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13097. <Messages>
  13098. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetVolumeNameForVolumeMountPoint(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetVolumeNameForVolumeMountPoint(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  13100. </Message>
  13101. </Messages>
  13102. </Member>
  13103. <Member Name="#GetVolumePathName(System.String,System.Text.StringBuilder,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13104. <Messages>
  13105. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetVolumePathName(string, StringBuilder, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetVolumePathName(string, StringBuilder, uint)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  13107. </Message>
  13108. </Messages>
  13109. </Member>
  13110. <Member Name="#IsValidHandle(System.Runtime.InteropServices.SafeHandle,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13111. <Messages>
  13112. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  13113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  13114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  13115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  13116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  13120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  13124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  13125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  13126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  13130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  13134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  13135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  13136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  13138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  13139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  13140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  13141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  13142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  13143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  13144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  13146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  13147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  13148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  13149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  13151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  13153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  13154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  13155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  13156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  13157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  13158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  13159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  13160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  13161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  13162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  13163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  13164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  13165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  13166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  13167. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  13168. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  13169. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13170. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13171. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  13172. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  13173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  13174. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13175. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13176. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13177. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  13178. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13179. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13181. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  13182. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  13183. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  13184. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13185. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13186. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  13188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13189. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13190. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13191. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  13192. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  13193. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  13194. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  13196. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  13197. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  13198. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  13199. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  13200. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  13201. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  13202. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13203. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  13204. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  13205. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  13206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  13207. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13208. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  13209. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13210. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  13211. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  13212. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  13213. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  13214. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  13215. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  13216. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  13217. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  13218. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  13219. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  13220. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  13221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  13222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  13223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  13224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  13225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  13226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  13227. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13228. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13229. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  13230. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  13231. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  13232. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13233. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13234. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13235. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  13236. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13237. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13238. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13239. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  13240. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  13241. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  13242. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  13243. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13244. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  13245. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  13246. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  13247. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13248. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13249. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetFileInfoByHandle(SafeFileHandle)'</Issue>
  13250. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  13251. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  13252. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13253. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  13254. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  13255. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  13256. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  13257. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  13258. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  13259. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  13260. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  13261. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  13262. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  13263. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  13264. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  13265. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13266. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  13267. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  13268. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  13269. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  13270. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  13271. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  13272. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  13273. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  13274. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  13275. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  13276. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  13277. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  13278. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  13279. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  13280. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  13281. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  13282. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  13283. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  13284. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  13285. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13286. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="49">'NativeMethods.IsValidHandle(SafeHandle, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13287. </Message>
  13288. </Messages>
  13289. </Member>
  13290. <Member Name="#IsValidHandle(System.Runtime.InteropServices.SafeHandle,System.Int32,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13291. <Messages>
  13292. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  13293. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  13294. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13295. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13296. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  13297. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13298. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsClosed.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsClosed.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13299. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  13300. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13301. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Native Methods" File="NativeMethods.Utilities.cs" Line="71">'NativeMethods.IsValidHandle(SafeHandle, int, bool)' calls into 'SafeHandle.IsInvalid.get()' which has a LinkDemand. By making this call, 'SafeHandle.IsInvalid.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'NativeMethods.IsValidHandle(SafeHandle, int, bool)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13302. </Message>
  13303. </Messages>
  13304. </Member>
  13305. <Member Name="#LockFile(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.UInt32,System.UInt32,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13306. <Messages>
  13307. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.LockFile(SafeFileHandle, uint, uint, uint, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.LockFile(SafeFileHandle, uint, uint, uint, uint)'&#xD;&#xA; -&gt;'BackupFileStream.Lock(long, long)'</Issue>
  13309. </Message>
  13310. </Messages>
  13311. </Member>
  13312. <Member Name="#MapViewOfFile(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.UInt32,System.UInt32,System.UIntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13313. <Messages>
  13314. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MapViewOfFile(SafeFileHandle, uint, uint, uint, UIntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MapViewOfFile(SafeFileHandle, uint, uint, uint, UIntPtr)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MapViewOfFile(SafeFileHandle, uint, uint, uint, UIntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MapViewOfFile(SafeFileHandle, uint, uint, uint, UIntPtr)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13317. </Message>
  13318. </Messages>
  13319. </Member>
  13320. <Member Name="#MoveFileTransacted(System.String,System.String,Alphaleonis.Win32.Filesystem.NativeMethods+NativeCopyMoveProgressRoutine,System.IntPtr,Alphaleonis.Win32.Filesystem.MoveOptions,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13321. <Messages>
  13322. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  13324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  13325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  13329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  13330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  13331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  13340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  13341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  13345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  13352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  13353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  13357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  13358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  13359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  13363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  13364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  13365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  13369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  13372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  13373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  13374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  13375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  13381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  13384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  13388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  13389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  13393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  13400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  13401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  13405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  13408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  13409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  13410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  13411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  13412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  13413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileTransacted(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions, SafeHandle)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  13417. </Message>
  13418. </Messages>
  13419. </Member>
  13420. <Member Name="#MoveFileWithProgress(System.String,System.String,Alphaleonis.Win32.Filesystem.NativeMethods+NativeCopyMoveProgressRoutine,System.IntPtr,Alphaleonis.Win32.Filesystem.MoveOptions)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13421. <Messages>
  13422. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  13424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  13425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  13429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  13430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  13431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  13440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  13441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  13445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  13452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  13453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  13457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  13458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  13459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  13463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  13464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  13465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  13469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  13472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  13473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  13474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  13475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  13481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  13484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  13488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  13489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  13493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  13500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  13501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  13505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  13508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  13509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  13510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  13511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  13512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  13513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.MoveFileWithProgress(string, string, NativeMethods.NativeCopyMoveProgressRoutine, IntPtr, MoveOptions)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  13517. </Message>
  13518. </Messages>
  13519. </Member>
  13520. <Member Name="#OpenEncryptedFileRaw(System.String,Alphaleonis.Win32.Filesystem.NativeMethods+EncryptedFileRawMode,Alphaleonis.Win32.Filesystem.SafeEncryptedFileRawHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13521. <Messages>
  13522. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  13524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  13525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  13526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  13527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  13528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  13529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  13530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  13531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  13532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  13533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  13534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.OpenEncryptedFileRaw(string, NativeMethods.EncryptedFileRawMode, out SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  13535. </Message>
  13536. </Messages>
  13537. </Member>
  13538. <Member Name="#PathFileExists(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13539. <Messages>
  13540. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.PathFileExists(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.PathFileExists(string)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  13542. </Message>
  13543. </Messages>
  13544. </Member>
  13545. <Member Name="#ReadEncryptedFileRaw(Alphaleonis.Win32.Filesystem.NativeMethods+EncryptedFileRawExportCallback,System.IntPtr,Alphaleonis.Win32.Filesystem.SafeEncryptedFileRawHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13546. <Messages>
  13547. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  13549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  13550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  13551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  13552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  13553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  13554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  13555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  13556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  13557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  13558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  13559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReadEncryptedFileRaw(NativeMethods.EncryptedFileRawExportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  13560. </Message>
  13561. </Messages>
  13562. </Member>
  13563. <Member Name="#RemoveDirectory(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13564. <Messages>
  13565. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  13567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  13568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  13572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  13573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  13574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  13583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  13584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  13588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  13595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  13596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  13600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  13601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  13602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  13606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  13607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  13608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  13609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  13610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  13611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  13612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  13613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  13614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  13615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  13616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  13617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  13621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  13622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  13623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  13624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  13626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  13630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  13631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectory(string)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  13632. </Message>
  13633. </Messages>
  13634. </Member>
  13635. <Member Name="#RemoveDirectoryTransacted(System.String,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13636. <Messages>
  13637. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  13639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  13640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  13644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  13645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  13646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  13655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  13656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  13660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  13667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  13668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  13672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  13673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  13674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  13678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  13679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  13680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  13681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  13682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  13683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  13684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  13685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  13686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  13687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  13688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  13689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  13693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  13694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  13695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  13696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  13698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  13702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  13703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RemoveDirectoryTransacted(string, SafeHandle)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  13704. </Message>
  13705. </Messages>
  13706. </Member>
  13707. <Member Name="#ReplaceFile(System.String,System.String,System.String,System.Security.AccessControl.FileSystemRights,System.IntPtr,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13708. <Messages>
  13709. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  13711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  13712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  13713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  13714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ReplaceFile(string, string, string, FileSystemRights, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  13715. </Message>
  13716. </Messages>
  13717. </Member>
  13718. <Member Name="#RollbackTransaction(System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13719. <Messages>
  13720. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.RollbackTransaction(SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.RollbackTransaction(SafeHandle)'&#xD;&#xA; -&gt;'KernelTransaction.Rollback()'</Issue>
  13722. </Message>
  13723. </Messages>
  13724. </Member>
  13725. <Member Name="#SetCurrentDirectory(System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  13726. <Messages>
  13727. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetCurrentDirectory(string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetCurrentDirectory(string)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  13729. </Message>
  13730. </Messages>
  13731. </Member>
  13732. <Member Name="#SetErrorMode(Alphaleonis.Win32.Filesystem.NativeMethods+ErrorMode)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  13733. <Messages>
  13734. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  13735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  13736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  13737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  13738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  13742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  13743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  13744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13748. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13749. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13750. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13751. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  13753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  13754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  13758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  13765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  13766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  13770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  13771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  13772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  13776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  13777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  13778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  13779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  13780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  13781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  13782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  13783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  13784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  13785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  13786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  13787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  13791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  13792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  13793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  13794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  13796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  13798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  13799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  13800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  13801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  13802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  13803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  13804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  13807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  13808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  13811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  13812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  13813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  13814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  13815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  13816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  13819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  13820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  13823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  13825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  13827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  13828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  13831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  13832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  13833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  13834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  13837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  13839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  13840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  13841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  13843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  13844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  13845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  13847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  13848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  13849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  13850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  13851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  13852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  13853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  13854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  13855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  13856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  13857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  13858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  13859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  13860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  13861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  13863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  13864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  13865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  13866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  13867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  13868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  13869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  13870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  13871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  13872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  13873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  13874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  13875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  13876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  13877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  13878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  13879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  13880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  13881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  13882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  13883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  13884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  13885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  13887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  13888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  13889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  13890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  13891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  13892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  13893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  13895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  13896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  13897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  13898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  13899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  13900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  13901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  13902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  13903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  13904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  13905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  13906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  13907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  13908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  13909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  13911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  13912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  13913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  13914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  13916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  13917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  13918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  13919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  13921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  13922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  13923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  13925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  13926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  13929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  13930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  13931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  13933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  13934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  13937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  13938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  13939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  13941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  13942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  13945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  13946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  13947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  13949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  13950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  13953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  13954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  13955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  13957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  13958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  13961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  13962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  13963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  13965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  13966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  13967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  13969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  13970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  13971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  13973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  13974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  13975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  13976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  13977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  13978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  13979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  13980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  13982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  13983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  13984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  13985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  13986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  13987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  13988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  13989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  13990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  13991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  13992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  13993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  13994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  13995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  13996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  13997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  13998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  13999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  14001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  14002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  14003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  14004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  14005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  14006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  14007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  14008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  14009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  14010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  14011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  14012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  14013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  14014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  14015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  14016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  14017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  14018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  14019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  14020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  14021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  14022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  14023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  14024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  14025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  14027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  14028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  14029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  14031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  14032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  14033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  14034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  14035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  14036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  14037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  14039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  14040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  14044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  14045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  14046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  14047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  14048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  14049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  14050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  14051. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  14052. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  14053. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  14054. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  14055. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  14056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  14057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  14059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  14060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  14061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14062. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  14063. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  14064. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  14065. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  14066. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  14067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  14069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  14070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  14071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14072. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  14073. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  14074. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  14075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  14076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  14077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  14078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  14079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  14080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  14081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  14082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  14083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  14084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  14085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  14086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  14087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  14088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  14090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  14091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  14092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  14093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  14094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  14095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  14096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  14097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  14098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  14099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  14100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  14101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  14102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  14103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  14104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  14105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  14106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  14107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  14108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  14109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  14110. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  14111. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  14112. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  14113. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  14114. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  14115. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  14117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  14118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  14119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  14120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  14122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  14123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  14124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  14125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  14127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  14128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  14129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  14130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  14132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  14133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  14134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  14136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  14137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  14138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  14139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  14141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  14142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  14143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  14144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  14145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  14146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  14147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  14148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  14149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  14150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  14151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  14153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  14154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  14155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  14156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  14157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  14158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  14159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  14161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  14162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  14163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  14164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  14165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  14166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  14167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  14168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  14169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  14170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  14172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  14173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  14174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  14175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  14176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  14177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  14178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  14179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  14180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  14181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  14182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  14183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  14184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  14185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  14186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  14187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  14188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  14189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  14190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  14191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  14192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  14193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  14194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  14195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  14196. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  14197. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  14198. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  14199. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  14200. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  14201. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  14202. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  14203. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  14204. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  14205. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  14206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  14207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  14208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  14210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  14211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  14212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  14213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  14214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  14215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  14216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  14217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  14218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  14219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  14220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  14221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  14222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  14223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  14224. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  14225. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  14226. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  14227. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  14228. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  14229. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  14230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  14231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  14232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  14233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  14234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  14235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  14236. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  14237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  14238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  14239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  14240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  14241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  14242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  14243. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14244. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  14245. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  14246. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  14247. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  14248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  14249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  14250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  14251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  14252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  14253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  14254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  14255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  14256. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  14257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  14258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  14259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  14260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  14261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  14262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  14263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  14264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  14265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  14266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  14267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  14269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  14270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  14271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  14272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  14273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  14277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  14278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  14283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  14284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  14285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  14289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  14290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  14295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  14296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  14297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  14301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  14302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  14307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  14313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  14319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  14320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  14321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  14325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  14326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  14331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  14332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  14333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  14337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  14338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  14343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  14344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  14345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  14349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  14350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  14355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  14361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  14367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  14368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  14369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  14370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  14371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  14372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  14374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  14375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  14376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  14377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  14378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  14379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  14380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  14381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  14382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  14383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  14384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  14385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  14386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  14388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  14389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  14390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  14391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  14392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  14393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  14394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  14395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  14396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  14397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  14398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  14399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  14400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  14401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  14402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  14403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  14404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  14405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  14406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  14407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  14408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  14409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  14410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  14411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  14412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  14413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  14414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  14415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  14416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  14417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  14418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  14419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  14420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  14421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  14422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  14423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  14424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  14425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  14426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  14427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  14428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  14429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  14430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  14431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  14432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  14433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  14435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  14439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  14441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  14442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  14444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  14445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  14446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  14448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  14449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  14450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  14451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  14455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  14456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  14460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  14461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  14462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  14464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  14465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  14466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  14468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  14469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  14470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  14471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  14475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  14476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  14480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  14481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  14482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  14484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  14485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  14486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  14488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  14489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  14492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  14493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  14494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  14496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  14497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  14498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  14500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  14501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  14502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  14504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  14505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  14506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  14507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  14508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  14511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  14512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  14513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  14516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  14517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  14518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  14519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  14520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  14521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  14523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  14524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  14525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  14526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  14527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  14529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  14530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  14531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  14532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  14533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  14534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  14535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  14536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  14537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  14538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  14539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  14540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  14541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  14542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  14543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  14544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  14545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  14546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  14547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  14548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  14549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  14550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  14551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  14552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  14553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  14554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  14555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  14556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  14557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  14558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  14559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  14560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  14561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  14562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  14563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  14564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  14565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  14566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  14567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  14568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  14569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  14570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  14571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  14572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  14573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  14574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  14575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  14576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string)'</Issue>
  14577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string, DosDeviceAttributes)'</Issue>
  14578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string)'</Issue>
  14579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string)'</Issue>
  14580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, DosDeviceAttributes, bool)'</Issue>
  14581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, bool)'</Issue>
  14582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPoint(string)'</Issue>
  14583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetDriveType(string)'</Issue>
  14584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  14585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  14586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.SetVolumeLabel(string, string)'</Issue>
  14587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  14588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  14589. </Message>
  14590. </Messages>
  14591. </Member>
  14592. <Member Name="#SetFileAttributes(System.String,System.IO.FileAttributes)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  14593. <Messages>
  14594. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  14595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  14596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  14597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  14600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  14601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  14602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  14603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  14604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  14605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  14608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  14610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  14611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  14612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  14613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  14616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  14617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  14618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  14619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  14622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  14624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  14625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  14628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  14629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  14630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  14631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  14634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  14635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  14636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  14637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  14638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  14639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  14640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  14641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  14642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  14643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  14644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  14645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  14646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  14648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  14649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  14650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  14651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  14652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  14653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  14655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  14657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  14658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  14659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  14660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  14661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  14662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  14663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  14666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  14667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  14670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  14671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  14672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  14673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  14674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  14675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  14678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  14679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  14682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  14684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  14685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  14686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  14687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  14690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  14691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  14692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  14693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  14696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  14698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  14699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  14702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  14703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  14706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  14707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  14708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  14709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  14710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  14711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  14714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  14715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  14716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  14717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  14718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  14719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  14720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  14722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  14723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  14724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  14725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  14726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  14727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  14728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  14729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  14730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  14731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  14732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  14733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  14734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  14735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  14736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  14737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  14738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  14739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  14740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  14741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  14742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  14743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  14744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  14745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributes(string, FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributes(string, FileAttributes)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  14746. </Message>
  14747. </Messages>
  14748. </Member>
  14749. <Member Name="#SetFileAttributesTransacted(System.String,System.IO.FileAttributes,System.Runtime.InteropServices.SafeHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  14750. <Messages>
  14751. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  14752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  14753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  14754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  14757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  14758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  14759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  14760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  14761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  14762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  14765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  14767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  14768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  14769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  14770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  14773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  14774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  14775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  14776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  14779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  14781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  14782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  14785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  14786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  14787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  14788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  14791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  14792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  14793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  14794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  14795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  14796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  14797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  14798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  14799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  14800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  14801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  14802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  14803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  14805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  14806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  14807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  14808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  14809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  14810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  14811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  14812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  14814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  14815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  14816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  14817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  14818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  14819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  14820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  14823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  14824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  14827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  14828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  14829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  14830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  14831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  14832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  14835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  14836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  14839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  14841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  14842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  14843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  14844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  14847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  14848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  14849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  14850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  14853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  14855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  14856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  14859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  14860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  14861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  14863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  14864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  14865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  14866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  14867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  14868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  14871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  14872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  14873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  14874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  14875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  14876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  14877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  14878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  14879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  14880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  14881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  14882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  14883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  14884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  14885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  14886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  14887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  14888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  14889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  14890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  14891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  14892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  14893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  14894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  14895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  14896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  14897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  14898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  14899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  14900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  14901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  14902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileAttributesTransacted(string, FileAttributes, SafeHandle)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  14903. </Message>
  14904. </Messages>
  14905. </Member>
  14906. <Member Name="#SetFileTime(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  14907. <Messages>
  14908. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  14909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  14910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  14911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  14912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  14916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  14917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  14922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  14923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  14924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  14928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  14929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  14934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  14935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  14936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  14937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  14940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  14941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  14942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  14943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  14944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  14945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  14946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  14952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  14955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  14956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  14957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  14958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  14959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  14962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  14963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  14964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  14965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  14966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  14967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  14970. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14971. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  14972. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  14973. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  14974. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  14975. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  14978. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  14979. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  14980. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  14981. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14982. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14983. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  14984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  14985. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  14986. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  14987. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  14988. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14989. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  14990. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  14991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  14992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  14993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  14994. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  14995. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  14996. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  14997. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  14998. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  14999. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15001. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  15002. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  15003. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15004. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15005. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  15006. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  15007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  15008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  15009. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  15010. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  15011. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15012. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15013. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  15014. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  15015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  15018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  15020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  15021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  15022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  15023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  15026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  15027. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  15028. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  15029. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15030. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15031. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  15032. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15033. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  15034. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  15035. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15036. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15037. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  15038. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  15039. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15040. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15041. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  15042. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  15043. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  15044. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  15045. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  15046. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  15047. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15048. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15049. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  15050. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  15051. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  15052. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  15053. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  15054. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15055. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15056. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15057. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  15058. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  15059. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15060. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15061. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15062. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15063. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  15064. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  15065. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  15066. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15067. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15068. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15069. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  15070. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  15071. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15072. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15073. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15074. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15075. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  15076. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  15077. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  15078. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15079. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15080. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15081. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  15082. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  15083. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15084. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15085. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15086. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15087. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  15088. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15089. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15090. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15091. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15092. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15093. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  15094. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15095. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15096. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15097. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15098. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15099. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  15100. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  15101. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  15102. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15103. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  15104. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  15105. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  15106. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15107. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  15108. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  15109. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetFileTime(SafeFileHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  15110. </Message>
  15111. </Messages>
  15112. </Member>
  15113. <Member Name="#SetThreadErrorMode(Alphaleonis.Win32.Filesystem.NativeMethods+ErrorMode,Alphaleonis.Win32.Filesystem.NativeMethods+ErrorMode&amp;)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  15114. <Messages>
  15115. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  15116. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'DiskSpaceInfo.Refresh()'</Issue>
  15117. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  15118. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  15119. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15120. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15121. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  15122. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  15123. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  15124. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  15125. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  15126. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  15127. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15128. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15129. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  15130. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15131. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  15132. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  15133. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  15134. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  15135. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15136. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15137. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  15138. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  15139. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  15140. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  15141. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15142. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15143. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  15144. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15145. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  15146. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  15147. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15148. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15149. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  15150. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  15151. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  15152. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  15153. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15154. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15155. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  15156. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  15157. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  15158. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  15159. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  15160. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  15161. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  15162. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  15163. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  15164. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  15165. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  15166. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  15167. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  15168. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  15169. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  15170. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  15171. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  15172. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  15173. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  15174. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  15175. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15176. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  15177. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  15178. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  15179. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  15180. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  15181. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  15182. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  15183. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  15184. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  15185. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15186. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15187. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  15188. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  15189. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15190. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15191. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  15192. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  15193. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  15194. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  15195. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  15196. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  15197. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15198. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15199. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  15200. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  15201. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15202. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15203. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  15204. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15205. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  15206. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  15207. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  15208. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  15209. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15210. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15211. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  15212. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  15213. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  15214. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  15215. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15216. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15217. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  15218. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15219. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  15220. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  15221. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  15222. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15223. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  15224. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  15225. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  15226. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15227. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  15228. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  15229. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  15230. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  15231. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  15232. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  15233. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  15234. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  15235. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  15236. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  15237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string)'</Issue>
  15238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool)'</Issue>
  15239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Delete(string, bool, PathFormat)'</Issue>
  15240. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string)'</Issue>
  15241. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  15242. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  15243. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete()'</Issue>
  15244. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.DeleteFileCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Delete(bool)'</Issue>
  15245. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  15246. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  15247. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  15248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  15249. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  15250. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  15251. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  15252. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  15253. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  15254. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  15255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  15256. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  15257. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  15258. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  15259. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  15260. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  15261. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  15262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  15263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  15264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  15265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  15266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15267. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  15268. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  15269. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  15270. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  15271. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  15272. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  15273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  15274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  15276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  15277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  15278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  15279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  15280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  15281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  15282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  15283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  15284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  15285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  15286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  15287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string)'</Issue>
  15288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.Exists(string, PathFormat)'</Issue>
  15289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string)'</Issue>
  15290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DriveInfo.IsReady.get()'</Issue>
  15292. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string)'</Issue>
  15293. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.Exists(string, PathFormat)'</Issue>
  15294. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string)'</Issue>
  15295. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.ExistsTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15296. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.ExistsCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Volume.IsReady(string)'</Issue>
  15297. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string)'</Issue>
  15298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributes(string, PathFormat)'</Issue>
  15299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string)'</Issue>
  15300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetAttributesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string)'</Issue>
  15302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTime(string, PathFormat)'</Issue>
  15303. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  15304. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15305. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string)'</Issue>
  15306. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtc(string, PathFormat)'</Issue>
  15307. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15308. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string)'</Issue>
  15310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTime(string, PathFormat)'</Issue>
  15311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string)'</Issue>
  15312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string)'</Issue>
  15314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtc(string, PathFormat)'</Issue>
  15315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetCreationTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetCreationTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string)'</Issue>
  15318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTime(string, PathFormat)'</Issue>
  15319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  15320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string)'</Issue>
  15322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  15323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string)'</Issue>
  15326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTime(string, PathFormat)'</Issue>
  15327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string)'</Issue>
  15328. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15329. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string)'</Issue>
  15330. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtc(string, PathFormat)'</Issue>
  15331. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15332. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastAccessTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15333. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string)'</Issue>
  15334. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTime(string, PathFormat)'</Issue>
  15335. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  15336. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15337. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string)'</Issue>
  15338. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  15339. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15340. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15341. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string)'</Issue>
  15342. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTime(string, PathFormat)'</Issue>
  15343. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string)'</Issue>
  15344. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15345. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string)'</Issue>
  15346. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtc(string, PathFormat)'</Issue>
  15347. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15348. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeCore(KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLastWriteTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15349. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  15350. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  15351. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  15352. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15353. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  15354. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  15355. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  15356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'File.GetAttributesExCore&lt;T&gt;(KernelTransaction, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'File.FillAttributeInfoCore(KernelTransaction, string, ref NativeMethods.WIN32_FILE_ATTRIBUTE_DATA, bool, bool)'&#xD;&#xA; -&gt;'FileSystemInfo.Refresh()'</Issue>
  15358. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string)'</Issue>
  15359. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfo(string, PathFormat)'</Issue>
  15360. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string)'</Issue>
  15361. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15362. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.Get&lt;T&gt;()'&#xD;&#xA; -&gt;'File.GetFileSystemEntryInfoCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.RefreshEntryInfo()'</Issue>
  15363. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  15364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  15365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  15366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  15367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  15369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  15370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  15374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  15375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  15377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  15378. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15379. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15380. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15381. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  15382. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  15383. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  15384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  15385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string)'</Issue>
  15386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableEncryption(string, PathFormat)'</Issue>
  15387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string)'</Issue>
  15388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableEncryption(string, PathFormat)'</Issue>
  15389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableEncryption()'</Issue>
  15390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EnableDisableEncryptionCore(string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableEncryption()'</Issue>
  15391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string)'</Issue>
  15392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, PathFormat)'</Issue>
  15393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool)'</Issue>
  15394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decrypt(string, bool, PathFormat)'</Issue>
  15395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string)'</Issue>
  15396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, PathFormat)'</Issue>
  15397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool)'</Issue>
  15398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Encrypt(string, bool, PathFormat)'</Issue>
  15399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt()'</Issue>
  15400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decrypt(bool)'</Issue>
  15401. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt()'</Issue>
  15402. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.EncryptDecryptDirectoryCore(string, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Encrypt(bool)'</Issue>
  15403. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string)'</Issue>
  15404. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRoot(string, PathFormat)'</Issue>
  15405. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string)'</Issue>
  15406. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoryRootTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string)'</Issue>
  15408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParent(string, PathFormat)'</Issue>
  15409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string)'</Issue>
  15410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetParentTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  15412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryName(string)'</Issue>
  15413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameTransacted(KernelTransaction, string)'</Issue>
  15414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRoot(string)'</Issue>
  15415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetParentCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootCore(KernelTransaction, string)'&#xD;&#xA; -&gt;'Path.GetSuffixedDirectoryNameWithoutRootTransacted(KernelTransaction, string)'</Issue>
  15416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string)'</Issue>
  15417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions)'</Issue>
  15418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetProperties(string, PathFormat)'</Issue>
  15420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string)'</Issue>
  15421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.GetPropertiesCore(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetPropertiesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15424. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Directory.SetCurrentDirectory(string, PathFormat)'</Issue>
  15425. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  15426. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  15427. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  15428. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  15429. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  15430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  15431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  15432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  15433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  15434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  15435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  15436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  15437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  15438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  15440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  15441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  15442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  15444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  15445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  15446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  15447. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  15448. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15449. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  15450. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  15451. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  15452. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  15454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  15455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  15456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  15457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  15458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  15459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  15460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  15461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  15462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  15463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  15464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  15465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  15466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  15467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  15468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  15469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  15471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  15472. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  15473. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  15474. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  15475. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  15476. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  15477. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  15478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  15479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  15480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  15481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  15482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  15483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  15484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  15485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  15486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  15487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  15488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  15489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  15490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  15491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  15492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  15493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  15494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  15495. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  15496. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15497. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  15498. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  15499. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  15500. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  15503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  15504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  15505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  15506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  15508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  15509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  15510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  15511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  15513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  15514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  15515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  15517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  15518. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  15519. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  15520. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15521. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  15522. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  15523. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  15524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  15525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  15526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  15527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  15528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  15529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  15530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  15531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  15532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  15534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  15535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  15536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  15537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  15538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  15539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  15540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  15542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  15543. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  15544. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  15545. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  15546. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  15547. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  15548. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  15549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  15550. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  15551. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15552. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  15553. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  15554. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  15555. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  15556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  15557. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  15558. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  15559. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  15560. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  15561. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  15562. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  15563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  15564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  15565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  15566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  15567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  15568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  15569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  15570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  15571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  15572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  15573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  15574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  15575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  15576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  15577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  15578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  15579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  15580. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  15581. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  15582. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  15583. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  15584. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  15585. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  15586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  15587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  15588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  15589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  15591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  15592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  15593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  15594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  15595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  15596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  15597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  15598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  15599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  15600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  15601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  15602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  15603. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  15604. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  15605. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  15606. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  15607. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  15608. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  15609. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  15610. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  15611. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  15612. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  15613. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  15614. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  15615. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  15616. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  15617. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  15618. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  15619. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  15620. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  15621. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  15622. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  15623. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  15624. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15625. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  15626. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  15627. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  15628. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  15629. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  15630. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  15631. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  15632. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  15633. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  15634. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  15635. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  15636. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  15637. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  15638. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  15639. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  15640. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  15641. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  15642. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  15643. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  15644. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  15645. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  15646. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  15647. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  15648. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15649. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  15650. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  15651. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  15652. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  15653. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  15654. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15655. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15656. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15657. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  15658. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  15659. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15660. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15661. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15662. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15663. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  15664. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  15665. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  15666. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15667. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15668. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15669. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  15670. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  15671. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15672. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15673. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15674. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15675. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  15676. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  15677. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  15678. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15679. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15680. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15681. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  15682. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  15683. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15684. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15685. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15686. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15687. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  15688. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15689. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15690. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15691. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15692. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15693. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  15694. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15695. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15696. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15697. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15698. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15699. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  15700. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  15701. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  15702. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15703. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15704. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15705. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  15706. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  15707. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15708. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15709. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15710. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15711. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  15712. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  15713. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  15714. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15715. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15716. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15717. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  15718. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  15719. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15720. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15721. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15722. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15723. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  15724. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  15725. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  15726. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  15727. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15728. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15729. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  15730. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  15731. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  15732. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  15733. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  15734. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  15735. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  15736. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15737. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15738. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15739. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15740. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15741. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  15742. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15743. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15744. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  15745. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  15746. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  15747. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  15748. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  15749. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  15750. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string)'</Issue>
  15751. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlink(string, string, PathFormat)'</Issue>
  15752. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string)'</Issue>
  15753. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateHardlinkCore(KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.CreateHardlinkTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15754. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget)'</Issue>
  15755. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLink(string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  15756. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget)'</Issue>
  15757. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkCore(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'&#xD;&#xA; -&gt;'File.CreateSymbolicLinkTransacted(KernelTransaction, string, string, SymbolicLinkTarget, PathFormat)'</Issue>
  15758. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string)'</Issue>
  15759. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decrypt(string, PathFormat)'</Issue>
  15760. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string)'</Issue>
  15761. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Encrypt(string, PathFormat)'</Issue>
  15762. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decrypt()'</Issue>
  15763. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.EncryptDecryptFileCore(bool, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Encrypt()'</Issue>
  15764. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string)'</Issue>
  15765. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSize(string, PathFormat)'</Issue>
  15766. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string)'</Issue>
  15767. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetCompressedSizeCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetCompressedSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15768. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string)'</Issue>
  15769. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.GetEncryptionStatusCore(string, PathFormat)'&#xD;&#xA; -&gt;'File.GetEncryptionStatus(string, PathFormat)'</Issue>
  15770. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  15771. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  15772. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  15773. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  15774. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  15775. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  15776. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  15777. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  15778. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  15779. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  15780. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  15781. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  15782. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string)'</Issue>
  15783. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool)'</Issue>
  15784. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Replace(string, string, string, bool, PathFormat)'</Issue>
  15785. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  15786. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.ReplaceCore(string, string, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  15787. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  15788. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  15789. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  15790. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  15791. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  15792. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  15793. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  15794. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  15795. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  15796. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  15797. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  15798. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  15799. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  15800. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  15801. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  15802. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  15803. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  15804. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes)'</Issue>
  15805. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributes(string, FileAttributes, PathFormat)'</Issue>
  15806. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes)'</Issue>
  15807. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetAttributesTransacted(KernelTransaction, string, FileAttributes, PathFormat)'</Issue>
  15808. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'File.SetAttributesCore(bool, KernelTransaction, string, FileAttributes, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.Attributes.set(FileAttributes)'</Issue>
  15809. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, PathFormat)'</Issue>
  15810. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileInfo.Replace(string, string, bool, PathFormat)'</Issue>
  15811. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DirectoryInfo(KernelTransaction, string, PathFormat)'</Issue>
  15812. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FileSystemInfo.InitializeCore(bool, KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.FileInfo(KernelTransaction, string, PathFormat)'</Issue>
  15813. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  15814. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15815. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions)'</Issue>
  15816. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjects(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15817. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15818. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15819. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  15820. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.CountFileSystemObjectsTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15821. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string)'</Issue>
  15822. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  15823. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15824. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, PathFormat)'</Issue>
  15825. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string)'</Issue>
  15826. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions)'</Issue>
  15827. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15828. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, PathFormat)'</Issue>
  15829. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption)'</Issue>
  15830. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectories(string, string, SearchOption, PathFormat)'</Issue>
  15831. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string)'</Issue>
  15832. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15833. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15834. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15835. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  15836. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  15837. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15838. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15839. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15840. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateDirectoriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  15841. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string)'</Issue>
  15842. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions)'</Issue>
  15843. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15844. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, PathFormat)'</Issue>
  15845. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string)'</Issue>
  15846. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions)'</Issue>
  15847. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15848. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, PathFormat)'</Issue>
  15849. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption)'</Issue>
  15850. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntries(string, string, SearchOption, PathFormat)'</Issue>
  15851. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  15852. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15853. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15854. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15855. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  15856. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  15857. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15858. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15859. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15860. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  15861. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string)'</Issue>
  15862. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions)'</Issue>
  15863. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15864. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, PathFormat)'</Issue>
  15865. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string)'</Issue>
  15866. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions)'</Issue>
  15867. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15868. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfos&lt;T&gt;(string, string, PathFormat)'</Issue>
  15869. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string)'</Issue>
  15870. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15871. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15872. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, PathFormat)'</Issue>
  15873. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string)'</Issue>
  15874. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  15875. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15876. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosTransacted&lt;T&gt;(KernelTransaction, string, string, PathFormat)'</Issue>
  15877. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string)'</Issue>
  15878. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  15879. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15880. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, PathFormat)'</Issue>
  15881. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string)'</Issue>
  15882. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions)'</Issue>
  15883. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15884. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, PathFormat)'</Issue>
  15885. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption)'</Issue>
  15886. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFiles(string, string, SearchOption, PathFormat)'</Issue>
  15887. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string)'</Issue>
  15888. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  15889. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15890. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, PathFormat)'</Issue>
  15891. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string)'</Issue>
  15892. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions)'</Issue>
  15893. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  15894. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  15895. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15896. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFilesTransacted(KernelTransaction, string, string, SearchOption, PathFormat)'</Issue>
  15897. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string)'</Issue>
  15898. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string)'</Issue>
  15899. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectories(string, string, SearchOption)'</Issue>
  15900. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string)'</Issue>
  15901. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string)'</Issue>
  15902. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetDirectoriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15903. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string)'</Issue>
  15904. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string)'</Issue>
  15905. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntries(string, string, SearchOption)'</Issue>
  15906. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string)'</Issue>
  15907. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string)'</Issue>
  15908. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFileSystemEntriesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15909. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string)'</Issue>
  15910. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string)'</Issue>
  15911. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFiles(string, string, SearchOption)'</Issue>
  15912. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string)'</Issue>
  15913. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string)'</Issue>
  15914. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetFilesTransacted(KernelTransaction, string, string, SearchOption)'</Issue>
  15915. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(DirectoryEnumerationOptions)'</Issue>
  15916. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CountFileSystemObjects(string, DirectoryEnumerationOptions)'</Issue>
  15917. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories()'</Issue>
  15918. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(DirectoryEnumerationOptions)'</Issue>
  15919. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string)'</Issue>
  15920. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, DirectoryEnumerationOptions)'</Issue>
  15921. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateDirectories(string, SearchOption)'</Issue>
  15922. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos()'</Issue>
  15923. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(DirectoryEnumerationOptions)'</Issue>
  15924. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string)'</Issue>
  15925. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, DirectoryEnumerationOptions)'</Issue>
  15926. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFileSystemInfos(string, SearchOption)'</Issue>
  15927. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles()'</Issue>
  15928. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(DirectoryEnumerationOptions)'</Issue>
  15929. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string)'</Issue>
  15930. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, DirectoryEnumerationOptions)'</Issue>
  15931. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnumerateFiles(string, SearchOption)'</Issue>
  15932. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories()'</Issue>
  15933. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string)'</Issue>
  15934. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetDirectories(string, SearchOption)'</Issue>
  15935. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos()'</Issue>
  15936. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string)'</Issue>
  15937. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFileSystemInfos(string, SearchOption)'</Issue>
  15938. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles()'</Issue>
  15939. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string)'</Issue>
  15940. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'FindFileSystemEntryInfo.FindFileSystemEntryInfo(bool, KernelTransaction, string, string, DirectoryEnumerationOptions, Type, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnumerateFileSystemEntryInfosCore&lt;T&gt;(KernelTransaction, string, string, DirectoryEnumerationOptions, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetFiles(string, SearchOption)'</Issue>
  15941. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetExtendedLengthPathCore(KernelTransaction, string, PathFormat, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32Info.Shell32Info(string, PathFormat)'</Issue>
  15942. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string)'</Issue>
  15943. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPath(string, GetFullPathOptions)'</Issue>
  15944. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string)'</Issue>
  15945. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTackleCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetFullPathTransacted(KernelTransaction, string, GetFullPathOptions)'</Issue>
  15946. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPath(string)'</Issue>
  15947. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetLongFrom83ShortPathTransacted(KernelTransaction, string)'</Issue>
  15948. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83Path(string)'</Issue>
  15949. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.GetLongShort83PathCore(KernelTransaction, string, bool)'&#xD;&#xA; -&gt;'Path.GetShort83PathTransacted(KernelTransaction, string)'</Issue>
  15950. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  15951. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  15952. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  15953. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Shell32.PathFileExists(string)'</Issue>
  15954. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  15955. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  15956. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Path.GetFullPathCore(KernelTransaction, string, GetFullPathOptions)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  15957. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string)'</Issue>
  15958. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DefineDosDevice(string, string, DosDeviceAttributes)'</Issue>
  15959. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string)'</Issue>
  15960. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string)'</Issue>
  15961. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, DosDeviceAttributes, bool)'</Issue>
  15962. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DefineDosDeviceCore(bool, string, string, DosDeviceAttributes, bool)'&#xD;&#xA; -&gt;'Volume.DeleteDosDevice(string, string, bool)'</Issue>
  15963. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPoint(string)'</Issue>
  15964. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetDriveType(string)'</Issue>
  15965. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  15966. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  15967. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.SetVolumeLabel(string, string)'</Issue>
  15968. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  15969. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetThreadErrorMode(NativeMethods.ErrorMode, out NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'NativeMethods.ChangeErrorMode.ChangeErrorMode(NativeMethods.ErrorMode)'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  15970. </Message>
  15971. </Messages>
  15972. </Member>
  15973. <Member Name="#SetVolumeLabel(System.String,System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  15974. <Messages>
  15975. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  15976. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetVolumeLabel(string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetVolumeLabel(string, string)'&#xD;&#xA; -&gt;'Volume.SetCurrentVolumeLabel(string)'</Issue>
  15977. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetVolumeLabel(string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetVolumeLabel(string, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeLabel(string, string)'</Issue>
  15978. </Message>
  15979. </Messages>
  15980. </Member>
  15981. <Member Name="#SetVolumeMountPoint(System.String,System.String)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  15982. <Messages>
  15983. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  15984. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetVolumeMountPoint(string, string)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetVolumeMountPoint(string, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  15985. </Message>
  15986. </Messages>
  15987. </Member>
  15988. <Member Name="#ShGetFileInfo(System.String,System.IO.FileAttributes,Alphaleonis.Win32.Filesystem.Shell32+FileInfo&amp;,System.UInt32,Alphaleonis.Win32.Filesystem.Shell32+FileAttributes)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  15989. <Messages>
  15990. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  15991. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileIcon(string, Shell32.FileAttributes)'</Issue>
  15992. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfo(string, FileAttributes, Shell32.FileAttributes, bool)'</Issue>
  15993. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.ShGetFileInfo(string, FileAttributes, out Shell32.FileInfo, uint, Shell32.FileAttributes)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32Info.Attributes.get()'</Issue>
  15994. </Message>
  15995. </Messages>
  15996. </Member>
  15997. <Member Name="#UnlockFile(Microsoft.Win32.SafeHandles.SafeFileHandle,System.UInt32,System.UInt32,System.UInt32,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  15998. <Messages>
  15999. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16000. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.UnlockFile(SafeFileHandle, uint, uint, uint, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.UnlockFile(SafeFileHandle, uint, uint, uint, uint)'&#xD;&#xA; -&gt;'BackupFileStream.Unlock(long, long)'</Issue>
  16001. </Message>
  16002. </Messages>
  16003. </Member>
  16004. <Member Name="#UnmapViewOfFile(Alphaleonis.Win32.Security.SafeLocalMemoryBufferHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16005. <Messages>
  16006. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16007. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.UnmapViewOfFile(SafeLocalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.UnmapViewOfFile(SafeLocalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  16008. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.UnmapViewOfFile(SafeLocalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.UnmapViewOfFile(SafeLocalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  16009. </Message>
  16010. </Messages>
  16011. </Member>
  16012. <Member Name="#WriteEncryptedFileRaw(Alphaleonis.Win32.Filesystem.NativeMethods+EncryptedFileRawImportCallback,System.IntPtr,Alphaleonis.Win32.Filesystem.SafeEncryptedFileRawHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16013. <Messages>
  16014. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16015. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream)'</Issue>
  16016. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ExportEncryptedDirectoryRaw(string, Stream, PathFormat)'</Issue>
  16017. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string)'</Issue>
  16018. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, PathFormat)'</Issue>
  16019. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool)'</Issue>
  16020. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'Directory.ImportEncryptedDirectoryRaw(Stream, string, bool, PathFormat)'</Issue>
  16021. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream)'</Issue>
  16022. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ExportEncryptedFileRaw(string, Stream, PathFormat)'</Issue>
  16023. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string)'</Issue>
  16024. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, PathFormat)'</Issue>
  16025. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool)'</Issue>
  16026. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WriteEncryptedFileRaw(NativeMethods.EncryptedFileRawImportCallback, IntPtr, SafeEncryptedFileRawHandle)'&#xD;&#xA; -&gt;'File.ImportExportEncryptedFileDirectoryRawCore(bool, bool, Stream, string, PathFormat, bool)'&#xD;&#xA; -&gt;'File.ImportEncryptedFileRaw(Stream, string, bool, PathFormat)'</Issue>
  16027. </Message>
  16028. </Messages>
  16029. </Member>
  16030. </Members>
  16031. </Type>
  16032. <Type Name="Path" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16033. <Members>
  16034. <Member Name="#GetFinalPathNameByHandleCore(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.Filesystem.FinalPathFormats)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16035. <Messages>
  16036. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  16038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  16039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.GetCurrentProcess()' which has a LinkDemand. By making this call, 'Process.GetCurrentProcess()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  16040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.GetCurrentProcess()' which has a LinkDemand. By making this call, 'Process.GetCurrentProcess()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  16041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.Handle.get()' which has a LinkDemand. By making this call, 'Process.Handle.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  16042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.Handle.get()' which has a LinkDemand. By making this call, 'Process.Handle.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  16043. </Message>
  16044. </Messages>
  16045. </Member>
  16046. <Member Name="#NormalizePath(System.String,Alphaleonis.Win32.Filesystem.GetFullPathOptions)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  16047. <Messages>
  16048. <Message TypeName="AvoidExcessiveLocals" Category="Microsoft.Performance" CheckId="CA1809" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16049. <Issue Name="Compiler" Certainty="95" Level="Warning" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.ValidationAndChecks.cs" Line="294">'Path.NormalizePath(string, GetFullPathOptions)' has 71 local variables, 47 of which were generated by the compiler. Refactor 'Path.NormalizePath(string, GetFullPathOptions)' so that it uses fewer than 64 local variables.</Issue>
  16050. </Message>
  16051. </Messages>
  16052. </Member>
  16053. </Members>
  16054. </Type>
  16055. <Type Name="SafeFindFileHandle" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16056. <Members>
  16057. <Member Name="#.ctor(System.IntPtr,System.Boolean)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  16058. <Messages>
  16059. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Safe Handles" File="SafeFindFileHandle.cs" Line="40">'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)'&#xD;&#xA; -&gt;'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)'</Issue>
  16061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Safe Handles" File="SafeFindFileHandle.cs" Line="40">'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)'&#xD;&#xA; -&gt;'SafeFindFileHandle.SafeFindFileHandle(IntPtr, bool)'</Issue>
  16062. </Message>
  16063. </Messages>
  16064. </Member>
  16065. </Members>
  16066. </Type>
  16067. <Type Name="SafeFindVolumeHandle" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16068. <Members>
  16069. <Member Name="#.ctor(System.IntPtr,System.Boolean)" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  16070. <Messages>
  16071. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Safe Handles" File="SafeFindVolumeHandle.cs" Line="41">'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)' calls into 'SafeHandle.SetHandle(IntPtr)' which has a LinkDemand. By making this call, 'SafeHandle.SetHandle(IntPtr)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)'&#xD;&#xA; -&gt;'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)'</Issue>
  16073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Safe Handles" File="SafeFindVolumeHandle.cs" Line="41">'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)' calls into 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' which has a LinkDemand. By making this call, 'SafeHandleZeroOrMinusOneIsInvalid.SafeHandleZeroOrMinusOneIsInvalid(bool)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)'&#xD;&#xA; -&gt;'SafeFindVolumeHandle.SafeFindVolumeHandle(IntPtr, bool)'</Issue>
  16074. </Message>
  16075. </Messages>
  16076. </Member>
  16077. </Members>
  16078. </Type>
  16079. <Type Name="Shell32" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16080. <Members>
  16081. <Member Name="#GetFileInfoCore(System.String,System.IO.FileAttributes,Alphaleonis.Win32.Filesystem.Shell32+FileAttributes,System.Boolean,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16082. <Messages>
  16083. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileIcon(string, Shell32.FileAttributes)'</Issue>
  16085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfo(string, FileAttributes, Shell32.FileAttributes, bool)'</Issue>
  16086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32Info.Attributes.get()'</Issue>
  16087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileIcon(string, Shell32.FileAttributes)'</Issue>
  16088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfo(string, FileAttributes, Shell32.FileAttributes, bool)'</Issue>
  16089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Shell32.cs" Line="815">'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32.GetFileInfoCore(string, FileAttributes, Shell32.FileAttributes, bool, bool)'&#xD;&#xA; -&gt;'Shell32Info.Attributes.get()'</Issue>
  16090. </Message>
  16091. </Messages>
  16092. </Member>
  16093. </Members>
  16094. </Type>
  16095. <Type Name="Volume" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16096. <Members>
  16097. <Member Name="#DeleteVolumeMountPointCore(System.String,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16098. <Messages>
  16099. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  16101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  16102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16103. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16104. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  16105. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  16106. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  16107. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  16108. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  16109. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  16110. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16111. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16112. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  16113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16114. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  16115. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  16116. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  16117. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  16118. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16119. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  16121. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  16122. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  16123. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  16124. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16125. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16126. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  16127. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16128. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  16129. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  16130. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16131. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16132. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  16133. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  16134. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  16135. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  16136. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16137. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16138. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  16139. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  16140. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string)'</Issue>
  16141. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, PathFormat)'</Issue>
  16142. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool)'</Issue>
  16143. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, PathFormat)'</Issue>
  16144. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool)'</Issue>
  16145. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Delete(string, bool, bool, PathFormat)'</Issue>
  16146. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool)'</Issue>
  16147. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, PathFormat)'</Issue>
  16148. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool)'</Issue>
  16149. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectories(string, bool, bool, PathFormat)'</Issue>
  16150. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool)'</Issue>
  16151. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  16152. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool)'</Issue>
  16153. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  16154. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories()'</Issue>
  16155. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool)'</Issue>
  16156. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteEmptySubdirectoriesCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DeleteEmptySubdirectories(bool, bool)'</Issue>
  16157. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string)'</Issue>
  16158. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16159. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool)'</Issue>
  16160. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  16161. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool)'</Issue>
  16162. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DeleteTransacted(KernelTransaction, string, bool, bool, PathFormat)'</Issue>
  16163. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete()'</Issue>
  16164. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool)'</Issue>
  16165. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Directory.DeleteDirectoryCore(FileSystemEntryInfo, KernelTransaction, string, bool, bool, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Delete(bool, bool)'</Issue>
  16166. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1116">'Volume.DeleteVolumeMountPointCore(string, bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPointCore(string, bool)'&#xD;&#xA; -&gt;'Volume.DeleteVolumeMountPoint(string)'</Issue>
  16167. </Message>
  16168. </Messages>
  16169. </Member>
  16170. <Member Name="#GetVolumeGuid(System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  16171. <Messages>
  16172. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16173. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="743">'Volume.GetVolumeGuid(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'&#xD;&#xA; -&gt;'Volume.GetVolumeGuid(string)'</Issue>
  16174. </Message>
  16175. </Messages>
  16176. </Member>
  16177. <Member Name="#GetVolumePathName(System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  16178. <Messages>
  16179. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16180. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="866">'Volume.GetVolumePathName(string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'&#xD;&#xA; -&gt;'Volume.GetVolumePathName(string)'</Issue>
  16181. </Message>
  16182. </Messages>
  16183. </Member>
  16184. <Member Name="#SetCurrentVolumeLabel(System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  16185. <Messages>
  16186. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16187. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="952">'Volume.SetCurrentVolumeLabel(string)' calls into 'Marshal.GetHRForLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetHRForLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.SetCurrentVolumeLabel(string)'&#xD;&#xA; -&gt;'Volume.SetCurrentVolumeLabel(string)'</Issue>
  16188. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="952">'Volume.SetCurrentVolumeLabel(string)' calls into 'Marshal.ThrowExceptionForHR(int)' which has a LinkDemand. By making this call, 'Marshal.ThrowExceptionForHR(int)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.SetCurrentVolumeLabel(string)'&#xD;&#xA; -&gt;'Volume.SetCurrentVolumeLabel(string)'</Issue>
  16189. </Message>
  16190. </Messages>
  16191. </Member>
  16192. <Member Name="#SetVolumeMountPoint(System.String,System.String)" Kind="Method" Static="True" Accessibility="Public" ExternallyVisible="True">
  16193. <Messages>
  16194. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16195. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="Volume.cs" Line="1006">'Volume.SetVolumeMountPoint(string, string)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'&#xD;&#xA; -&gt;'Volume.SetVolumeMountPoint(string, string)'</Issue>
  16196. </Message>
  16197. </Messages>
  16198. </Member>
  16199. </Members>
  16200. </Type>
  16201. <Type Name="VolumeInfo" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16202. <Members>
  16203. <Member Name="#Refresh()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  16204. <Messages>
  16205. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16206. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem" File="VolumeInfo.cs" Line="117">'VolumeInfo.Refresh()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'VolumeInfo.Refresh()'&#xD;&#xA; -&gt;'VolumeInfo.Refresh()'</Issue>
  16207. </Message>
  16208. </Messages>
  16209. </Member>
  16210. </Members>
  16211. </Type>
  16212. </Types>
  16213. </Namespace>
  16214. <Namespace Name="Alphaleonis.Win32.Network">
  16215. <Types>
  16216. <Type Name="DfsInfo" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  16217. <Members>
  16218. <Member Name="#.ctor(Alphaleonis.Win32.Network.NativeMethods+DFS_INFO_9)" Kind="Method" Static="False" Accessibility="Assembly" ExternallyVisible="False">
  16219. <Messages>
  16220. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16221. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string)'</Issue>
  16222. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string, string, string)'</Issue>
  16223. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.PtrToStructure(IntPtr, Type)' which has a LinkDemand. By making this call, 'Marshal.PtrToStructure(IntPtr, Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsInfo(string)'</Issue>
  16224. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string)'</Issue>
  16225. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string, string, string)'</Issue>
  16226. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Network" File="DfsInfo.cs" Line="107">'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)' calls into 'Marshal.SizeOf(Type)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(Type)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'DfsInfo.DfsInfo(NativeMethods.DFS_INFO_9)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsInfo(string)'</Issue>
  16227. </Message>
  16228. </Messages>
  16229. </Member>
  16230. </Members>
  16231. </Type>
  16232. <Type Name="NativeMethods" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  16233. <Members>
  16234. <Member Name="#NetDfsGetClientInfo(System.String,System.String,System.String,System.UInt32,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16235. <Messages>
  16236. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16237. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string)'</Issue>
  16238. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string, string, string)'</Issue>
  16239. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetClientInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsInfo(string)'</Issue>
  16240. </Message>
  16241. </Messages>
  16242. </Member>
  16243. <Member Name="#NetDfsGetInfo(System.String,System.String,System.String,System.UInt32,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16244. <Messages>
  16245. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16246. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string)'</Issue>
  16247. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsClientInfo(string, string, string)'</Issue>
  16248. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetDfsGetInfo(string, string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetDfsInfoCore(bool, string, string, string)'&#xD;&#xA; -&gt;'Host.GetDfsInfo(string)'</Issue>
  16249. </Message>
  16250. </Messages>
  16251. </Member>
  16252. <Member Name="#NetFileClose(System.String,System.UInt32)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16253. <Messages>
  16254. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16255. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetFileClose(string, uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetFileClose(string, uint)'&#xD;&#xA; -&gt;'OpenResourceInfo.Close()'</Issue>
  16256. </Message>
  16257. </Messages>
  16258. </Member>
  16259. <Member Name="#NetShareGetInfo(System.String,System.String,System.UInt32,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16260. <Messages>
  16261. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16262. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(ShareInfoLevel, string, bool)'</Issue>
  16263. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(ShareInfoLevel, string, string, bool)'</Issue>
  16264. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(string, bool)'</Issue>
  16265. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'Host.GetShareInfo(string, string, bool)'</Issue>
  16266. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.NetShareGetInfo(string, string, uint, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'Host.GetShareInfoCore(ShareInfoLevel, string, string, bool)'&#xD;&#xA; -&gt;'ShareInfo.ResourceType.get()'</Issue>
  16267. </Message>
  16268. </Messages>
  16269. </Member>
  16270. <Member Name="#WNetCancelConnection(System.String,Alphaleonis.Win32.Network.NativeMethods+Connect,System.Boolean)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16271. <Messages>
  16272. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16273. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.Dispose(bool)'&#xD;&#xA; -&gt;'DriveConnection.Dispose()'</Issue>
  16274. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.Dispose(bool)'&#xD;&#xA; -&gt;'DriveConnection.~DriveConnection()'</Issue>
  16275. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string)'</Issue>
  16276. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string, NetworkCredential, bool)'</Issue>
  16277. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string, string, string, bool)'</Issue>
  16278. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(IntPtr, string, string, NetworkCredential, bool, bool, bool)'</Issue>
  16279. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(IntPtr, string, string, string, string, bool, bool, bool)'</Issue>
  16280. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string)'</Issue>
  16281. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string, NetworkCredential, bool, bool, bool)'</Issue>
  16282. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string, string, string, bool, bool, bool)'</Issue>
  16283. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(IntPtr, string, NetworkCredential, bool, bool, bool)'</Issue>
  16284. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(IntPtr, string, string, string, bool, bool, bool)'</Issue>
  16285. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string)'</Issue>
  16286. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string, NetworkCredential, bool, bool, bool)'</Issue>
  16287. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string, string, string, bool, bool, bool)'</Issue>
  16288. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectDrive(string)'</Issue>
  16289. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectDrive(string, bool, bool)'</Issue>
  16290. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectFrom(string)'</Issue>
  16291. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetCancelConnection(string, NativeMethods.Connect, bool)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectFrom(string, bool, bool)'</Issue>
  16292. </Message>
  16293. </Messages>
  16294. </Member>
  16295. <Member Name="#WNetGetUniversalName(System.String,System.UInt32,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16296. <Messages>
  16297. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16298. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedConnectionName(string)'</Issue>
  16299. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.GetMappedUncName(string)'</Issue>
  16300. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string)'</Issue>
  16301. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool)'</Issue>
  16302. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetGetUniversalName(string, uint, SafeGlobalMemoryBufferHandle, out uint)'&#xD;&#xA; -&gt;'Host.GetRemoteNameInfoCore(string, bool)'&#xD;&#xA; -&gt;'Path.LocalToUncCore(string, bool, bool, bool)'&#xD;&#xA; -&gt;'Path.LocalToUnc(string, bool, bool, bool)'</Issue>
  16303. </Message>
  16304. </Messages>
  16305. </Member>
  16306. <Member Name="#WNetUseConnection(System.IntPtr,Alphaleonis.Win32.Network.NativeMethods+NETRESOURCE&amp;,System.String,System.String,Alphaleonis.Win32.Network.NativeMethods+Connect,System.Text.StringBuilder,System.UInt32&amp;,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16307. <Messages>
  16308. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16309. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.Dispose(bool)'&#xD;&#xA; -&gt;'DriveConnection.Dispose()'</Issue>
  16310. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.Dispose(bool)'&#xD;&#xA; -&gt;'DriveConnection.~DriveConnection()'</Issue>
  16311. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string)'</Issue>
  16312. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string, NetworkCredential, bool)'</Issue>
  16313. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'DriveConnection.DriveConnection(string, string, string, bool)'</Issue>
  16314. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(IntPtr, string, string, NetworkCredential, bool, bool, bool)'</Issue>
  16315. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(IntPtr, string, string, string, string, bool, bool, bool)'</Issue>
  16316. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string)'</Issue>
  16317. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string, NetworkCredential, bool, bool, bool)'</Issue>
  16318. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectDrive(string, string, string, string, bool, bool, bool)'</Issue>
  16319. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(IntPtr, string, NetworkCredential, bool, bool, bool)'</Issue>
  16320. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(IntPtr, string, string, string, bool, bool, bool)'</Issue>
  16321. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string)'</Issue>
  16322. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string, NetworkCredential, bool, bool, bool)'</Issue>
  16323. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.ConnectTo(string, string, string, bool, bool, bool)'</Issue>
  16324. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectDrive(string)'</Issue>
  16325. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectDrive(string, bool, bool)'</Issue>
  16326. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectFrom(string)'</Issue>
  16327. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.WNetUseConnection(IntPtr, ref NativeMethods.NETRESOURCE, string, string, NativeMethods.Connect, StringBuilder, out uint, out uint)'&#xD;&#xA; -&gt;'Host.ConnectDisconnectCore(Host.ConnectDisconnectArguments)'&#xD;&#xA; -&gt;'Host.DisconnectFrom(string, bool, bool)'</Issue>
  16328. </Message>
  16329. </Messages>
  16330. </Member>
  16331. </Members>
  16332. </Type>
  16333. </Types>
  16334. </Namespace>
  16335. <Namespace Name="Alphaleonis.Win32.Security">
  16336. <Types>
  16337. <Type Name="InternalPrivilegeEnabler" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  16338. <Members>
  16339. <Member Name="#AdjustPrivilege(System.Boolean)" Kind="Method" Static="False" Accessibility="Private" ExternallyVisible="False">
  16340. <Messages>
  16341. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16342. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="InternalPrivilegeEnabler.cs" Line="71">'InternalPrivilegeEnabler.AdjustPrivilege(bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.Dispose()'&#xD;&#xA; -&gt;'PrivilegeEnabler.Dispose()'</Issue>
  16343. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="InternalPrivilegeEnabler.cs" Line="71">'InternalPrivilegeEnabler.AdjustPrivilege(bool)' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.InternalPrivilegeEnabler(Privilege)'&#xD;&#xA; -&gt;'PrivilegeEnabler.PrivilegeEnabler(Privilege, params Privilege[])'</Issue>
  16344. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="InternalPrivilegeEnabler.cs" Line="71">'InternalPrivilegeEnabler.AdjustPrivilege(bool)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.Dispose()'&#xD;&#xA; -&gt;'PrivilegeEnabler.Dispose()'</Issue>
  16345. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="InternalPrivilegeEnabler.cs" Line="71">'InternalPrivilegeEnabler.AdjustPrivilege(bool)' calls into 'Marshal.SizeOf(object)' which has a LinkDemand. By making this call, 'Marshal.SizeOf(object)' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.InternalPrivilegeEnabler(Privilege)'&#xD;&#xA; -&gt;'PrivilegeEnabler.PrivilegeEnabler(Privilege, params Privilege[])'</Issue>
  16346. </Message>
  16347. </Messages>
  16348. </Member>
  16349. </Members>
  16350. </Type>
  16351. <Type Name="NativeMethods" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  16352. <Members>
  16353. <Member Name="#AdjustTokenPrivileges(System.IntPtr,System.Boolean,Alphaleonis.Win32.Security.TokenPrivileges&amp;,System.UInt32,Alphaleonis.Win32.Security.TokenPrivileges&amp;,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16354. <Messages>
  16355. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16356. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AdjustTokenPrivileges(IntPtr, bool, ref TokenPrivileges, uint, out TokenPrivileges, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AdjustTokenPrivileges(IntPtr, bool, ref TokenPrivileges, uint, out TokenPrivileges, out uint)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.Dispose()'&#xD;&#xA; -&gt;'PrivilegeEnabler.Dispose()'</Issue>
  16357. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.AdjustTokenPrivileges(IntPtr, bool, ref TokenPrivileges, uint, out TokenPrivileges, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.AdjustTokenPrivileges(IntPtr, bool, ref TokenPrivileges, uint, out TokenPrivileges, out uint)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.AdjustPrivilege(bool)'&#xD;&#xA; -&gt;'InternalPrivilegeEnabler.InternalPrivilegeEnabler(Privilege)'&#xD;&#xA; -&gt;'PrivilegeEnabler.PrivilegeEnabler(Privilege, params Privilege[])'</Issue>
  16358. </Message>
  16359. </Messages>
  16360. </Member>
  16361. <Member Name="#GetNamedSecurityInfo(System.String,Alphaleonis.Win32.Security.ObjectType,Alphaleonis.Win32.Security.SecurityInformation,System.IntPtr&amp;,System.IntPtr&amp;,System.IntPtr&amp;,System.IntPtr&amp;,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16362. <Messages>
  16363. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16364. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  16365. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  16366. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16367. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  16368. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  16369. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  16370. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  16371. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  16372. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  16373. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  16374. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16375. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  16376. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  16377. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetNamedSecurityInfo(string, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  16378. </Message>
  16379. </Messages>
  16380. </Member>
  16381. <Member Name="#GetSecurityDescriptorControl(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,Alphaleonis.Win32.Security.SecurityDescriptorControl&amp;,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16382. <Messages>
  16383. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16384. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16385. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16386. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16387. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16388. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16389. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16390. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16391. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16392. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16393. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16394. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16395. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16396. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16397. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16398. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16399. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16400. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorControl(SafeGlobalMemoryBufferHandle, out SecurityDescriptorControl, out uint)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16401. </Message>
  16402. </Messages>
  16403. </Member>
  16404. <Member Name="#GetSecurityDescriptorDacl(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.Boolean&amp;,System.IntPtr&amp;,System.Boolean&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16405. <Messages>
  16406. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16407. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16408. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16409. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16410. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16411. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16412. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16413. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16414. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16415. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16416. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16417. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16418. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16419. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16420. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16421. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16422. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16423. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorDacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16424. </Message>
  16425. </Messages>
  16426. </Member>
  16427. <Member Name="#GetSecurityDescriptorGroup(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.IntPtr&amp;,System.Boolean&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16428. <Messages>
  16429. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16430. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16431. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16432. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16433. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16434. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16435. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16436. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16437. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16438. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16439. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16440. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16441. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16442. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16443. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16444. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16445. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16446. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorGroup(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16447. </Message>
  16448. </Messages>
  16449. </Member>
  16450. <Member Name="#GetSecurityDescriptorLength(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16451. <Messages>
  16452. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16453. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  16454. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  16455. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  16456. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16457. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  16458. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  16459. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  16460. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  16461. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  16462. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  16463. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  16464. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16465. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  16466. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  16467. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  16468. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  16469. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  16470. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  16471. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorLength(SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetSecurityDescriptor&lt;T&gt;(uint, bool, string, SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  16472. </Message>
  16473. </Messages>
  16474. </Member>
  16475. <Member Name="#GetSecurityDescriptorOwner(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.IntPtr&amp;,System.Boolean&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16476. <Messages>
  16477. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16478. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16479. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16480. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16481. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16482. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16483. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16484. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16485. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16486. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16487. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16488. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16489. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16490. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16491. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16492. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16493. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16494. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorOwner(SafeGlobalMemoryBufferHandle, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16495. </Message>
  16496. </Messages>
  16497. </Member>
  16498. <Member Name="#GetSecurityDescriptorSacl(Alphaleonis.Win32.SafeGlobalMemoryBufferHandle,System.Boolean&amp;,System.IntPtr&amp;,System.Boolean&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16499. <Messages>
  16500. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16501. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16502. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16503. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16504. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16505. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16506. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16507. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16508. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16509. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16510. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16511. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16512. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16513. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16514. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16515. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16516. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16517. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityDescriptorSacl(SafeGlobalMemoryBufferHandle, out bool, out IntPtr, out bool)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16518. </Message>
  16519. </Messages>
  16520. </Member>
  16521. <Member Name="#GetSecurityInfo(System.Runtime.InteropServices.SafeHandle,Alphaleonis.Win32.Security.ObjectType,Alphaleonis.Win32.Security.SecurityInformation,System.IntPtr&amp;,System.IntPtr&amp;,System.IntPtr&amp;,System.IntPtr&amp;,Alphaleonis.Win32.SafeGlobalMemoryBufferHandle&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16522. <Messages>
  16523. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16524. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'BackupFileStream.GetAccessControl()'</Issue>
  16525. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle)'</Issue>
  16526. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  16527. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle)'</Issue>
  16528. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControl(SafeFileHandle, AccessControlSections)'</Issue>
  16529. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  16530. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  16531. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16532. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  16533. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  16534. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  16535. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  16536. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  16537. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  16538. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  16539. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16540. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  16541. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  16542. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.GetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, out IntPtr, out IntPtr, out IntPtr, out IntPtr, out SafeGlobalMemoryBufferHandle)'&#xD;&#xA; -&gt;'File.GetAccessControlHandleCore&lt;T&gt;(bool, bool, SafeFileHandle, AccessControlSections, SecurityInformation)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  16543. </Message>
  16544. </Messages>
  16545. </Member>
  16546. <Member Name="#LookupPrivilegeDisplayName(System.String,System.String,System.Text.StringBuilder&amp;,System.UInt32&amp;,System.UInt32&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16547. <Messages>
  16548. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16549. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.LookupPrivilegeDisplayName(string, string, ref StringBuilder, ref uint, out uint)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.LookupPrivilegeDisplayName(string, string, ref StringBuilder, ref uint, out uint)'&#xD;&#xA; -&gt;'Privilege.LookupDisplayName()'</Issue>
  16550. </Message>
  16551. </Messages>
  16552. </Member>
  16553. <Member Name="#LookupPrivilegeValue(System.String,System.String,Alphaleonis.Win32.Security.Luid&amp;)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16554. <Messages>
  16555. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16556. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.LookupPrivilegeValue(string, string, out Luid)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.LookupPrivilegeValue(string, string, out Luid)'&#xD;&#xA; -&gt;'Privilege.LookupLuid()'</Issue>
  16557. </Message>
  16558. </Messages>
  16559. </Member>
  16560. <Member Name="#SetNamedSecurityInfo(System.String,Alphaleonis.Win32.Security.ObjectType,Alphaleonis.Win32.Security.SecurityInformation,System.IntPtr,System.IntPtr,System.IntPtr,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16561. <Messages>
  16562. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16563. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16564. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16565. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16566. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16567. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16568. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16569. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16570. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16571. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16572. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16573. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16574. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16575. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16576. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16577. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16578. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16579. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetNamedSecurityInfo(string, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16580. </Message>
  16581. </Messages>
  16582. </Member>
  16583. <Member Name="#SetSecurityInfo(System.Runtime.InteropServices.SafeHandle,Alphaleonis.Win32.Security.ObjectType,Alphaleonis.Win32.Security.SecurityInformation,System.IntPtr,System.IntPtr,System.IntPtr,System.IntPtr)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  16584. <Messages>
  16585. <Message TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="Breaking">
  16586. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.SetAccessControl(ObjectSecurity)'</Issue>
  16587. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity)'</Issue>
  16588. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(SafeFileHandle, DirectorySecurity, AccessControlSections)'</Issue>
  16589. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity)'</Issue>
  16590. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections)'</Issue>
  16591. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, AccessControlSections, PathFormat)'</Issue>
  16592. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetAccessControl(string, DirectorySecurity, PathFormat)'</Issue>
  16593. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity)'</Issue>
  16594. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.SetAccessControl(DirectorySecurity, AccessControlSections)'</Issue>
  16595. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity)'</Issue>
  16596. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(SafeFileHandle, FileSecurity, AccessControlSections)'</Issue>
  16597. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity)'</Issue>
  16598. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections)'</Issue>
  16599. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, AccessControlSections, PathFormat)'</Issue>
  16600. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.SetAccessControl(string, FileSecurity, PathFormat)'</Issue>
  16601. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity)'</Issue>
  16602. <Issue Name="PlatformInvokeStack" Certainty="33" Level="CriticalError">Review declarative security for 'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)' and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SetSecurityInfo(SafeHandle, ObjectType, SecurityInformation, IntPtr, IntPtr, IntPtr, IntPtr)'&#xD;&#xA; -&gt;'File.SetAccessControlCore(string, SafeFileHandle, ObjectSecurity, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.SetAccessControl(FileSecurity, AccessControlSections)'</Issue>
  16603. </Message>
  16604. </Messages>
  16605. </Member>
  16606. </Members>
  16607. </Type>
  16608. <Type Name="NativeMethods+SecurityAttributes" Kind="Class" Accessibility="Assembly" ExternallyVisible="False">
  16609. <Members>
  16610. <Member Name="#ToUnmanagedSecurityAttributes(System.Security.AccessControl.ObjectSecurity)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  16611. <Messages>
  16612. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  16613. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string)'</Issue>
  16614. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions)'</Issue>
  16615. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16616. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16617. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  16618. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, PathFormat)'</Issue>
  16619. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool)'</Issue>
  16620. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Copy(string, string, bool, PathFormat)'</Issue>
  16621. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string)'</Issue>
  16622. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  16623. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16624. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16625. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  16626. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16627. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  16628. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  16629. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string)'</Issue>
  16630. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions)'</Issue>
  16631. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16632. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16633. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, MoveOptions, PathFormat)'</Issue>
  16634. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.Move(string, string, PathFormat)'</Issue>
  16635. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string)'</Issue>
  16636. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  16637. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16638. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16639. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  16640. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'Directory.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16641. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string)'</Issue>
  16642. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions)'</Issue>
  16643. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16644. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16645. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  16646. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyTo(string, PathFormat)'</Issue>
  16647. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string)'</Issue>
  16648. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions)'</Issue>
  16649. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16650. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16651. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  16652. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CopyMoveCore(KernelTransaction, string, string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CopyToMoveToCore(string, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.MoveTo(string, PathFormat)'</Issue>
  16653. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string)'</Issue>
  16654. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity)'</Issue>
  16655. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, PathFormat)'</Issue>
  16656. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool)'</Issue>
  16657. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, DirectorySecurity, bool, PathFormat)'</Issue>
  16658. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, PathFormat)'</Issue>
  16659. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool)'</Issue>
  16660. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, bool, PathFormat)'</Issue>
  16661. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string)'</Issue>
  16662. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity)'</Issue>
  16663. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, PathFormat)'</Issue>
  16664. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool)'</Issue>
  16665. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  16666. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, PathFormat)'</Issue>
  16667. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool)'</Issue>
  16668. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectory(string, string, bool, PathFormat)'</Issue>
  16669. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string)'</Issue>
  16670. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity)'</Issue>
  16671. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, PathFormat)'</Issue>
  16672. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool)'</Issue>
  16673. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, DirectorySecurity, bool, PathFormat)'</Issue>
  16674. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16675. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool)'</Issue>
  16676. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, bool, PathFormat)'</Issue>
  16677. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string)'</Issue>
  16678. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity)'</Issue>
  16679. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, PathFormat)'</Issue>
  16680. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool)'</Issue>
  16681. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, DirectorySecurity, bool, PathFormat)'</Issue>
  16682. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16683. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool)'</Issue>
  16684. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  16685. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create()'</Issue>
  16686. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity)'</Issue>
  16687. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(DirectorySecurity, bool)'</Issue>
  16688. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Create(bool)'</Issue>
  16689. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string)'</Issue>
  16690. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity)'</Issue>
  16691. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, DirectorySecurity, bool)'</Issue>
  16692. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, bool)'</Issue>
  16693. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, DirectorySecurity, bool)'</Issue>
  16694. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'Directory.CreateDirectoryCore(KernelTransaction, string, string, ObjectSecurity, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectoryCore(string, string, DirectorySecurity, bool)'&#xD;&#xA; -&gt;'DirectoryInfo.CreateSubdirectory(string, string, bool)'</Issue>
  16695. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode)'</Issue>
  16696. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights)'</Issue>
  16697. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare)'</Issue>
  16698. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  16699. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  16700. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode)'</Issue>
  16701. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights)'</Issue>
  16702. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare)'</Issue>
  16703. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes)'</Issue>
  16704. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'BackupFileStream.BackupFileStream(string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, FileSecurity)'</Issue>
  16705. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string)'</Issue>
  16706. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions)'</Issue>
  16707. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  16708. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Compress(string, PathFormat)'</Issue>
  16709. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string)'</Issue>
  16710. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  16711. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  16712. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16713. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string)'</Issue>
  16714. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions)'</Issue>
  16715. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  16716. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.Decompress(string, PathFormat)'</Issue>
  16717. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string)'</Issue>
  16718. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions)'</Issue>
  16719. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, DirectoryEnumerationOptions, PathFormat)'</Issue>
  16720. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16721. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress()'</Issue>
  16722. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Compress(DirectoryEnumerationOptions)'</Issue>
  16723. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress()'</Issue>
  16724. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.CompressDecompressCore(KernelTransaction, string, string, DirectoryEnumerationOptions, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.Decompress(DirectoryEnumerationOptions)'</Issue>
  16725. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string)'</Issue>
  16726. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompression(string, PathFormat)'</Issue>
  16727. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string)'</Issue>
  16728. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.DisableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16729. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string)'</Issue>
  16730. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompression(string, PathFormat)'</Issue>
  16731. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string)'</Issue>
  16732. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.EnableCompressionTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16733. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.DisableCompression()'</Issue>
  16734. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.EnableCompression()'</Issue>
  16735. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string)'</Issue>
  16736. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Compress(string, PathFormat)'</Issue>
  16737. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string)'</Issue>
  16738. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16739. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string)'</Issue>
  16740. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.Decompress(string, PathFormat)'</Issue>
  16741. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string)'</Issue>
  16742. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.DecompressTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16743. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Compress()'</Issue>
  16744. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'Device.ToggleCompressionCore(bool, KernelTransaction, string, bool, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Decompress()'</Issue>
  16745. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string)'</Issue>
  16746. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions)'</Issue>
  16747. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16748. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16749. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, PathFormat)'</Issue>
  16750. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool)'</Issue>
  16751. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  16752. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16753. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, CopyOptions, bool, PathFormat)'</Issue>
  16754. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, PathFormat)'</Issue>
  16755. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool)'</Issue>
  16756. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Copy(string, string, bool, PathFormat)'</Issue>
  16757. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string)'</Issue>
  16758. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions)'</Issue>
  16759. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16760. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16761. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, PathFormat)'</Issue>
  16762. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool)'</Issue>
  16763. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  16764. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16765. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, CopyOptions, bool, PathFormat)'</Issue>
  16766. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16767. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool)'</Issue>
  16768. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.CopyTransacted(KernelTransaction, string, string, bool, PathFormat)'</Issue>
  16769. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string)'</Issue>
  16770. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions)'</Issue>
  16771. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16772. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16773. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, MoveOptions, PathFormat)'</Issue>
  16774. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.Move(string, string, PathFormat)'</Issue>
  16775. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string)'</Issue>
  16776. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions)'</Issue>
  16777. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16778. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16779. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, MoveOptions, PathFormat)'</Issue>
  16780. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'File.MoveTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16781. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string)'</Issue>
  16782. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions)'</Issue>
  16783. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object)'</Issue>
  16784. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16785. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, PathFormat)'</Issue>
  16786. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool)'</Issue>
  16787. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object)'</Issue>
  16788. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16789. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, CopyOptions, bool, PathFormat)'</Issue>
  16790. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, PathFormat)'</Issue>
  16791. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool)'</Issue>
  16792. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyTo(string, bool, PathFormat)'</Issue>
  16793. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string)'</Issue>
  16794. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions)'</Issue>
  16795. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object)'</Issue>
  16796. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, CopyMoveProgressRoutine, object, PathFormat)'</Issue>
  16797. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, MoveOptions, PathFormat)'</Issue>
  16798. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CopyMoveCore(bool, KernelTransaction, string, string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, CopyMoveResult, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CopyToMoveToCore(string, bool, CopyOptions?, MoveOptions?, CopyMoveProgressRoutine, object, out string, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.MoveTo(string, PathFormat)'</Issue>
  16799. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string)'</Issue>
  16800. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, PathFormat)'</Issue>
  16801. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int)'</Issue>
  16802. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions)'</Issue>
  16803. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity)'</Issue>
  16804. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  16805. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, FileOptions, PathFormat)'</Issue>
  16806. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.Create(string, int, PathFormat)'</Issue>
  16807. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string)'</Issue>
  16808. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, Encoding, PathFormat)'</Issue>
  16809. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateText(string, PathFormat)'</Issue>
  16810. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string)'</Issue>
  16811. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  16812. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string)'</Issue>
  16813. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16814. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int)'</Issue>
  16815. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions)'</Issue>
  16816. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity)'</Issue>
  16817. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  16818. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, FileOptions, PathFormat)'</Issue>
  16819. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'File.CreateTransacted(KernelTransaction, string, int, PathFormat)'</Issue>
  16820. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Create()'</Issue>
  16821. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.CreateFileStreamCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileAccess, FileShare, int, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.CreateText()'</Issue>
  16822. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string)'</Issue>
  16823. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections)'</Issue>
  16824. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16825. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetAccessControl(string, PathFormat)'</Issue>
  16826. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string)'</Issue>
  16827. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'Directory.HasInheritedPermissions(string, PathFormat)'</Issue>
  16828. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl()'</Issue>
  16829. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'DirectoryInfo.GetAccessControl(AccessControlSections)'</Issue>
  16830. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string)'</Issue>
  16831. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections)'</Issue>
  16832. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, AccessControlSections, PathFormat)'</Issue>
  16833. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControl(string, PathFormat)'</Issue>
  16834. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl()'</Issue>
  16835. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetAccessControlCore&lt;T&gt;(bool, string, AccessControlSections, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetAccessControl(AccessControlSections)'</Issue>
  16836. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(SafeFileHandle)'</Issue>
  16837. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string)'</Issue>
  16838. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTime(string, PathFormat)'</Issue>
  16839. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  16840. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16841. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  16842. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string)'</Issue>
  16843. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtc(string, PathFormat)'</Issue>
  16844. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  16845. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16846. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(SafeFileHandle)'</Issue>
  16847. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string)'</Issue>
  16848. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTime(string, PathFormat)'</Issue>
  16849. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string)'</Issue>
  16850. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16851. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(SafeFileHandle)'</Issue>
  16852. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string)'</Issue>
  16853. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtc(string, PathFormat)'</Issue>
  16854. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string)'</Issue>
  16855. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeCore(bool, KernelTransaction, SafeFileHandle, string, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetChangeTimeUtcTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16856. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string)'</Issue>
  16857. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfo(string, PathFormat)'</Issue>
  16858. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string)'</Issue>
  16859. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetLinkTargetInfoTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16860. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(SafeFileHandle)'</Issue>
  16861. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string)'</Issue>
  16862. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSize(string, PathFormat)'</Issue>
  16863. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string)'</Issue>
  16864. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeCore(KernelTransaction, SafeFileHandle, string, PathFormat)'&#xD;&#xA; -&gt;'File.GetSizeTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16865. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  16866. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  16867. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  16868. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  16869. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  16870. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  16871. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  16872. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  16873. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string)'</Issue>
  16874. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupRead(string, PathFormat)'</Issue>
  16875. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string)'</Issue>
  16876. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenBackupReadTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16877. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string)'</Issue>
  16878. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding)'</Issue>
  16879. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, Encoding, PathFormat)'</Issue>
  16880. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendText(string, PathFormat)'</Issue>
  16881. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string)'</Issue>
  16882. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  16883. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  16884. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16885. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText()'</Issue>
  16886. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.AppendTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.AppendText(Encoding)'</Issue>
  16887. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType)'</Issue>
  16888. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(KernelTransaction, string, HashType, PathFormat)'</Issue>
  16889. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType)'</Issue>
  16890. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'File.GetHash(string, HashType, PathFormat)'</Issue>
  16891. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.GetHashCore(KernelTransaction, string, HashType, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.GetHash(HashType)'</Issue>
  16892. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string)'</Issue>
  16893. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLocked(string, PathFormat)'</Issue>
  16894. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string)'</Issue>
  16895. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedCore(KernelTransaction, string, PathFormat)'&#xD;&#xA; -&gt;'File.IsLockedTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16896. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode)'</Issue>
  16897. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess)'</Issue>
  16898. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare)'</Issue>
  16899. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  16900. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  16901. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int)'</Issue>
  16902. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  16903. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  16904. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  16905. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  16906. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  16907. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  16908. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  16909. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, FileAccess, PathFormat)'</Issue>
  16910. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.Open(string, FileMode, PathFormat)'</Issue>
  16911. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode)'</Issue>
  16912. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess)'</Issue>
  16913. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare)'</Issue>
  16914. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, PathFormat)'</Issue>
  16915. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, PathFormat)'</Issue>
  16916. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int)'</Issue>
  16917. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes)'</Issue>
  16918. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  16919. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions)'</Issue>
  16920. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, FileOptions, PathFormat)'</Issue>
  16921. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, PathFormat)'</Issue>
  16922. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool)'</Issue>
  16923. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, FileShare, int, bool, PathFormat)'</Issue>
  16924. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileAccess, PathFormat)'</Issue>
  16925. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, PathFormat)'</Issue>
  16926. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string)'</Issue>
  16927. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding)'</Issue>
  16928. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, Encoding, PathFormat)'</Issue>
  16929. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllText(string, PathFormat)'</Issue>
  16930. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string)'</Issue>
  16931. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding)'</Issue>
  16932. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, Encoding, PathFormat)'</Issue>
  16933. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextCore(KernelTransaction, string, Encoding, PathFormat)'&#xD;&#xA; -&gt;'File.ReadAllTextTransacted(KernelTransaction, string, PathFormat)'</Issue>
  16934. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[])'</Issue>
  16935. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytes(string, byte[], PathFormat)'</Issue>
  16936. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[])'</Issue>
  16937. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesCore(KernelTransaction, string, byte[], PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllBytesTransacted(KernelTransaction, string, byte[], PathFormat)'</Issue>
  16938. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode)'</Issue>
  16939. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess)'</Issue>
  16940. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileAccess, FileShare)'</Issue>
  16941. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenRead()'</Issue>
  16942. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText()'</Issue>
  16943. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenText(Encoding)'</Issue>
  16944. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileAccess, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.OpenWrite()'</Issue>
  16945. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes)'</Issue>
  16946. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity)'</Issue>
  16947. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, FileSecurity, PathFormat)'</Issue>
  16948. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, ExtendedFileAttributes, PathFormat)'</Issue>
  16949. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions)'</Issue>
  16950. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity)'</Issue>
  16951. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, FileSecurity, PathFormat)'</Issue>
  16952. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.OpenTransacted(KernelTransaction, string, FileMode, FileSystemRights, FileShare, int, FileOptions, PathFormat)'</Issue>
  16953. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  16954. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  16955. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  16956. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  16957. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  16958. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  16959. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  16960. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  16961. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string)'</Issue>
  16962. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding)'</Issue>
  16963. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, Encoding, PathFormat)'</Issue>
  16964. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllText(string, string, PathFormat)'</Issue>
  16965. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string)'</Issue>
  16966. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  16967. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  16968. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.AppendAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16969. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;)'</Issue>
  16970. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  16971. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  16972. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  16973. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[])'</Issue>
  16974. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding)'</Issue>
  16975. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], Encoding, PathFormat)'</Issue>
  16976. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLines(string, string[], PathFormat)'</Issue>
  16977. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;)'</Issue>
  16978. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding)'</Issue>
  16979. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, PathFormat)'</Issue>
  16980. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, IEnumerable&lt;string&gt;, PathFormat)'</Issue>
  16981. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[])'</Issue>
  16982. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding)'</Issue>
  16983. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], Encoding, PathFormat)'</Issue>
  16984. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllLinesTransacted(KernelTransaction, string, string[], PathFormat)'</Issue>
  16985. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string)'</Issue>
  16986. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding)'</Issue>
  16987. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, Encoding, PathFormat)'</Issue>
  16988. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllText(string, string, PathFormat)'</Issue>
  16989. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string)'</Issue>
  16990. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding)'</Issue>
  16991. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, Encoding, PathFormat)'</Issue>
  16992. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAppendAllLinesCore(KernelTransaction, string, IEnumerable&lt;string&gt;, Encoding, bool, bool, PathFormat)'&#xD;&#xA; -&gt;'File.WriteAllTextTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  16993. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights)'</Issue>
  16994. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.OpenCore(KernelTransaction, string, FileMode, FileSystemRights, FileShare, ExtendedFileAttributes, int?, FileSecurity, PathFormat)'&#xD;&#xA; -&gt;'FileInfo.Open(FileMode, FileSystemRights, FileShare)'</Issue>
  16995. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime)'</Issue>
  16996. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  16997. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  16998. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  16999. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17000. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17001. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime)'</Issue>
  17002. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  17003. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17004. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17005. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17006. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17007. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime)'</Issue>
  17008. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  17009. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  17010. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  17011. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17012. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17013. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  17014. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  17015. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17016. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17017. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17018. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17019. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime)'</Issue>
  17020. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  17021. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  17022. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  17023. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17024. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17025. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  17026. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  17027. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17028. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17029. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17030. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17031. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  17032. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17033. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17034. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  17035. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17036. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17037. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  17038. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17039. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17040. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  17041. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17042. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'Directory.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17043. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime)'</Issue>
  17044. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, PathFormat)'</Issue>
  17045. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTime(string, DateTime, bool, PathFormat)'</Issue>
  17046. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  17047. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17048. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17049. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime)'</Issue>
  17050. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, PathFormat)'</Issue>
  17051. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17052. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17053. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17054. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetCreationTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17055. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime)'</Issue>
  17056. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, PathFormat)'</Issue>
  17057. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTime(string, DateTime, bool, PathFormat)'</Issue>
  17058. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  17059. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17060. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17061. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime)'</Issue>
  17062. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, PathFormat)'</Issue>
  17063. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17064. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17065. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17066. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastAccessTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17067. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime)'</Issue>
  17068. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, PathFormat)'</Issue>
  17069. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTime(string, DateTime, bool, PathFormat)'</Issue>
  17070. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime)'</Issue>
  17071. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17072. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17073. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime)'</Issue>
  17074. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, PathFormat)'</Issue>
  17075. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtc(string, DateTime, bool, PathFormat)'</Issue>
  17076. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime)'</Issue>
  17077. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, PathFormat)'</Issue>
  17078. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetLastWriteTimeUtcTransacted(KernelTransaction, string, DateTime, bool, PathFormat)'</Issue>
  17079. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime)'</Issue>
  17080. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17081. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestamps(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17082. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  17083. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17084. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17085. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime)'</Issue>
  17086. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17087. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtc(string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17088. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime)'</Issue>
  17089. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, PathFormat)'</Issue>
  17090. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetTimestampsUtcTransacted(KernelTransaction, string, DateTime, DateTime, DateTime, bool, PathFormat)'</Issue>
  17091. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string)'</Issue>
  17092. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestamps(string, string, PathFormat)'</Issue>
  17093. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  17094. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'Directory.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  17095. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string)'</Issue>
  17096. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestamps(string, string, PathFormat)'</Issue>
  17097. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string)'</Issue>
  17098. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsCore(bool, KernelTransaction, string, string, PathFormat)'&#xD;&#xA; -&gt;'File.TransferTimestampsTransacted(KernelTransaction, string, string, PathFormat)'</Issue>
  17099. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.CreationTimeUtc.set(DateTime)'</Issue>
  17100. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastAccessTimeUtc.set(DateTime)'</Issue>
  17101. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'File.CreateFileCore(KernelTransaction, string, ExtendedFileAttributes, FileSecurity, FileMode, FileSystemRights, FileShare, bool, PathFormat)'&#xD;&#xA; -&gt;'File.SetFsoDateTimeCore(bool, KernelTransaction, string, DateTime?, DateTime?, DateTime?, bool, PathFormat)'&#xD;&#xA; -&gt;'FileSystemInfo.LastWriteTimeUtc.set(DateTime)'</Issue>
  17102. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="SecurityAttributes.cs" Line="53">'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)' calls into 'SafeHandle.Close()' which has a LinkDemand. By making this call, 'SafeHandle.Close()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.ToUnmanagedSecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'NativeMethods.SecurityAttributes.SecurityAttributes(ObjectSecurity)'&#xD;&#xA; -&gt;'KernelTransaction.KernelTransaction(ObjectSecurity, int, string)'</Issue>
  17103. </Message>
  17104. </Messages>
  17105. </Member>
  17106. </Members>
  17107. </Type>
  17108. <Type Name="Privilege" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  17109. <Members>
  17110. <Member Name="#LookupDisplayName()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  17111. <Messages>
  17112. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  17113. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="Privilege.cs" Line="368">'Privilege.LookupDisplayName()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Privilege.LookupDisplayName()'&#xD;&#xA; -&gt;'Privilege.LookupDisplayName()'</Issue>
  17114. </Message>
  17115. </Messages>
  17116. </Member>
  17117. <Member Name="#LookupLuid()" Kind="Method" Static="False" Accessibility="Public" ExternallyVisible="True">
  17118. <Messages>
  17119. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:32:27Z" FixCategory="NonBreaking">
  17120. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Security" File="Privilege.cs" Line="398">'Privilege.LookupLuid()' calls into 'Marshal.GetLastWin32Error()' which has a LinkDemand. By making this call, 'Marshal.GetLastWin32Error()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Privilege.LookupLuid()'&#xD;&#xA; -&gt;'Privilege.LookupLuid()'</Issue>
  17121. </Message>
  17122. </Messages>
  17123. </Member>
  17124. </Members>
  17125. </Type>
  17126. </Types>
  17127. </Namespace>
  17128. </Namespaces>
  17129. </Module>
  17130. </Modules>
  17131. </Target>
  17132. </Targets>
  17133. <Rules>
  17134. <Rule TypeName="AssembliesShouldHaveValidStrongNames" Category="Microsoft.Design" CheckId="CA2210">
  17135. <Name>Assemblies should have valid strong names</Name>
  17136. <Description>Either the assembly has no strong name, an invalid one, or the strong name is valid only because of the computer configuration. The assembly should not be deployed in this state. The most common causes of this are: 1) The assembly's contents were modified after it was signed. 2) The signing process failed. 3) The assembly was delay-signed. 4) A registry key existed that allowed the check to pass (where it would not have otherwise).</Description>
  17137. <Resolution Name="NoStrongName">Sign {0} with a strong name key.</Resolution>
  17138. <Owner />
  17139. <Url>http://msdn.microsoft.com/library/ms182127.aspx</Url>
  17140. <Email>[none]</Email>
  17141. <MessageLevel Certainty="95">CriticalError</MessageLevel>
  17142. <File Name="designrules.dll" Version="14.0.0.0" />
  17143. </Rule>
  17144. <Rule TypeName="AvoidExcessiveLocals" Category="Microsoft.Performance" CheckId="CA1809">
  17145. <Name>Avoid excessive locals</Name>
  17146. <Description>Method implementations should not contain more than 64 local variables. In order for the run-time to enregister local variables most efficiently, there should be 64 or fewer of them. Enregistering based on flow analysis will not occur for locals in excess of 64, which may result in slower performance.</Description>
  17147. <Resolution Name="Compiler">{0} has {1} local variables, {2} of which were generated by the compiler. Refactor {0} so that it uses fewer than 64 local variables.</Resolution>
  17148. <Owner />
  17149. <Url>http://msdn.microsoft.com/library/ms182263.aspx</Url>
  17150. <Email>[none]</Email>
  17151. <MessageLevel Certainty="95">Warning</MessageLevel>
  17152. <File Name="performancerules.dll" Version="14.0.0.0" />
  17153. </Rule>
  17154. <Rule TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122">
  17155. <Name>Do not indirectly expose methods with link demands</Name>
  17156. <Description>Do not wrap a method protected by a LinkDemand with a method that does not perform a security check. A LinkDemand checks the permissions of the immediate caller rather than checking the permissions of all callers in the call stack. In this case, the permissions of the wrapper method will be checked. If the wrapper method does not, itself, check the permissions of callers higher in the call stack, malicious code might be able to execute the wrapped function even though it lacks permission to do so.</Description>
  17157. <Resolution Name="Default">{0} calls into {1} which has a LinkDemand. By making this call, {1} is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: {2}</Resolution>
  17158. <Owner />
  17159. <Url>http://msdn.microsoft.com/library/ms182303.aspx</Url>
  17160. <Email>[none]</Email>
  17161. <MessageLevel Certainty="33">CriticalError</MessageLevel>
  17162. <File Name="securityrules.dll" Version="14.0.0.0" />
  17163. </Rule>
  17164. <Rule TypeName="ReviewSuppressUnmanagedCodeSecurityUsage" Category="Microsoft.Security" CheckId="CA2118">
  17165. <Name>Review SuppressUnmanagedCodeSecurityAttribute usage</Name>
  17166. <Description>Calling a method with the SuppressUnmanagedCodeSecurityAttribute applied to it can create a security weakness. Unmanaged code security checks ensure that all callers in the call stack have permission to execute unmanaged code. Disabling code security for P/Invoke methods allows callers that do not have this permission to breach security. This is acceptable only if the code is completely harmless, or callers have no way to pass arbitrary arguments through to the unmanaged code.</Description>
  17167. <Resolution Name="PlatformInvokeStack">Review declarative security for {0} and its callers for potential vulnerabilities. The following call stack might expose a way to circumvent security protection: {1}</Resolution>
  17168. <Owner />
  17169. <Url>http://msdn.microsoft.com/library/ms182311.aspx</Url>
  17170. <Email>[none]</Email>
  17171. <MessageLevel Certainty="33">CriticalError</MessageLevel>
  17172. <File Name="securityrules.dll" Version="14.0.0.0" />
  17173. </Rule>
  17174. </Rules>
  17175. <Localized>
  17176. <String Key="Category">Category</String>
  17177. <String Key="Certainty">Certainty</String>
  17178. <String Key="CollapseAll">Collapse All</String>
  17179. <String Key="CheckId">Check Id</String>
  17180. <String Key="Error">Error</String>
  17181. <String Key="Errors">error(s)</String>
  17182. <String Key="ExpandAll">Expand All</String>
  17183. <String Key="Help">Help</String>
  17184. <String Key="Line">Line</String>
  17185. <String Key="Messages">message(s)</String>
  17186. <String Key="LocationNotStoredInPdb">[Location not stored in Pdb]</String>
  17187. <String Key="Project">Project</String>
  17188. <String Key="Resolution">Resolution</String>
  17189. <String Key="Rule">Rule</String>
  17190. <String Key="RuleFile">Rule File</String>
  17191. <String Key="RuleDescription">Rule Description</String>
  17192. <String Key="Source">Source</String>
  17193. <String Key="Status">Status</String>
  17194. <String Key="Target">Target</String>
  17195. <String Key="Warning">Warning</String>
  17196. <String Key="Warnings">warning(s)</String>
  17197. <String Key="ReportTitle">Code Analysis Report</String>
  17198. </Localized>
  17199. </FxCopReport>